[Git][security-tracker-team/security-tracker][master] Track fixed version for freerdp3 issues fixed via unstable

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
57d95c9b by Salvatore Bonaccorso at 2024-04-30T06:01:14+02:00
Track fixed version for freerdp3 issues fixed via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1208,7 +1208,7 @@ CVE-2024-32677 (Missing Authorization vulnerability in 
LoginPress LoginPress Pro
 CVE-2024-32675 (Missing Authorization vulnerability in Xfinity Soft Order 
Limit for Wo ...)
NOT-FOR-US: WordPress plugin
 CVE-2024-32662 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. FreeR ...)
-   - freerdp3 
+   - freerdp3 3.5.1+dfsg1-1
- freerdp2 
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4
NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7
 (3.5.1)
@@ -1342,22 +1342,22 @@ CVE-2024-33211 (Tenda FH1206 V1.2.0.8(8155)_EN was 
discovered to contain a stack
 CVE-2024-32679 (Missing Authorization vulnerability in Shared Files PRO Shared 
Files.T ...)
NOT-FOR-US: WordPress plugin
 CVE-2024-32661 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. FreeR ...)
-   - freerdp3  (bug #1069752)
+   - freerdp3 3.5.1+dfsg1-1 (bug #1069752)
- freerdp2 
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m
NOTE: Fixed by: 
https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793
 (3.5.1)
 CVE-2024-32660 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. Prior ...)
-   - freerdp3  (bug #1069752)
+   - freerdp3 3.5.1+dfsg1-1 (bug #1069752)
- freerdp2 
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx
NOTE: Fixed by: 
https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47
 (3.5.1)
 CVE-2024-32659 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. FreeR ...)
-   - freerdp3  (bug #1069752)
+   - freerdp3 3.5.1+dfsg1-1 (bug #1069752)
- freerdp2 
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w
NOTE: Fixed by: 
https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b
 (3.5.1)
 CVE-2024-32658 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. FreeR ...)
-   - freerdp3  (bug #1069752)
+   - freerdp3 3.5.1+dfsg1-1 (bug #1069752)
- freerdp2 
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vpv3-m3m9-4c2v
NOTE: Fixed by: 
https://github.com/FreeRDP/FreeRDP/commit/1a755d898ddc028cc818d0dd9d49d5acff4c44bf
 (3.5.1)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/57d95c9b03b0c5eb21627dff805666fc3ab6bab6

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/57d95c9b03b0c5eb21627dff805666fc3ab6bab6
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add note about bind9 in dla-needed

2024-04-29 Thread Santiago R.R. (@santiago)


Santiago R.R. pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1bffabfa by Santiago Ruano Rincón at 2024-04-29T20:56:18-03:00
Add note about bind9 in dla-needed

- - - - -


1 changed file:

- data/dla-needed.txt


Changes:

=
data/dla-needed.txt
=
@@ -48,6 +48,7 @@ bind9 (Santiago)
   NOTE: 20240418: Patch created for CVE-2023-50387 and CVE-2023-50868 and 
package builds fine.
   NOTE: 20240418: 
https://salsa.debian.org/lts-team/packages/bind9/-/commit/135e46d2e43b6e499454385c2228338c6a72ba96
   NOTE: 20240418: All testing activities remains.
+  NOTE: 20240929: Waiting some days to get more information about 
CVE-2023-50387 and CVE-2023-50868. Working on CVE-2023-4408 (Santiago)
 --
 dcmtk (Adrian Bunk)
   NOTE: 20240428: Added by Front-Desk (ta)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1bffabfadb4550540c86edb4abfaf840eb1ebe1e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1bffabfadb4550540c86edb4abfaf840eb1ebe1e
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] LTS: claim runc in dla-needed.txt

2024-04-29 Thread Daniel Leidert (@dleidert)


Daniel Leidert pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
63ccc448 by Daniel Leidert at 2024-04-30T01:07:27+02:00
LTS: claim runc in dla-needed.txt
- - - - -


1 changed file:

- data/dla-needed.txt


Changes:

=
data/dla-needed.txt
=
@@ -246,7 +246,7 @@ ring
   NOTE: 20230903: Added by Front-Desk (gladk)
   NOTE: 20230928: will be likely hard to fix see 
https://lists.debian.org/debian-lts/2023/09/msg00035.html (rouca)
 --
-runc
+runc (dleidert)
   NOTE: 20240312: Added by coordinator (roberto)
   NOTE: 20240314: Several CVEs fixed in LTS remain unfixed (no-dsa) in 
bullseye.
   NOTE: 20240314: Uploads to ospu should be coordinated. (roberto)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/63ccc4481f2cde28ebfeddcf04f9d11589cc478b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/63ccc4481f2cde28ebfeddcf04f9d11589cc478b
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] LTS: release claim on runc in dla-needed.txt

2024-04-29 Thread Daniel Leidert (@dleidert)


Daniel Leidert pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6e63d00b by Daniel Leidert at 2024-04-30T01:06:46+02:00
LTS: release claim on runc in dla-needed.txt
- - - - -


1 changed file:

- data/dla-needed.txt


Changes:

=
data/dla-needed.txt
=
@@ -246,7 +246,7 @@ ring
   NOTE: 20230903: Added by Front-Desk (gladk)
   NOTE: 20230928: will be likely hard to fix see 
https://lists.debian.org/debian-lts/2023/09/msg00035.html (rouca)
 --
-runc (dleidert)
+runc
   NOTE: 20240312: Added by coordinator (roberto)
   NOTE: 20240314: Several CVEs fixed in LTS remain unfixed (no-dsa) in 
bullseye.
   NOTE: 20240314: Uploads to ospu should be coordinated. (roberto)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e63d00babf1e43eb882be6f1a0b18c6435348b1

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e63d00babf1e43eb882be6f1a0b18c6435348b1
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] CVE-2023-25809 does not affect Buster

2024-04-29 Thread Daniel Leidert (@dleidert)


Daniel Leidert pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
92dbe571 by Daniel Leidert at 2024-04-30T01:05:10+02:00
CVE-2023-25809 does not affect Buster

The code is not present and seems to be in the code handling cgroup2 mounts.
That code was added later, and these mountpoints are ignored anyway.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -82265,7 +82265,7 @@ CVE-2023-25810 (Uptime Kuma is a self-hosted monitoring 
tool. In versions prior
 CVE-2023-25809 (runc is a CLI tool for spawning and running containers 
according to th ...)
- runc 1.1.5+ds1-1
[bullseye] - runc  (Minor issue)
-   [buster] - runc  (Minor issue)
+   [buster] - runc  (Vulnerable code not present)
NOTE: 
https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc
NOTE: 
https://github.com/opencontainers/runc/commit/0e6b818a2b0d24fdb6697614e5c5f115bbe8e3a5
 (v1.1.5)
 CVE-2023-25808



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/92dbe5710671af12c19e714a34a39ad3c32971fe

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/92dbe5710671af12c19e714a34a39ad3c32971fe
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2024-27322/r-base

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
aaa32c18 by Salvatore Bonaccorso at 2024-04-29T23:30:06+02:00
Add CVE-2024-27322/r-base

Needs some additional review for assessment.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -105,7 +105,9 @@ CVE-2024-28961 (Dell OpenManage Enterprise, versions 4.0.0 
and 4.0.1, contains a
 CVE-2024-28320 (Insecure Direct Object References (IDOR) vulnerability in 
Hospital Man ...)
TODO: check
 CVE-2024-27322 (Deserialization of untrusted data can occur in the R 
statistical progr ...)
-   TODO: check
+   - r-base 4.4.0-2
+   NOTE: https://hiddenlayer.com/research/r-bitrary-code-execution/
+   NOTE: https://kb.cert.org/vuls/id/238194
 CVE-2024-23995 (Cross Site Scripting (XSS) in Beekeeper Studio 4.1.13 and 
earlier allo ...)
TODO: check
 CVE-2024-1969 (Buffer Copy without Checking Size of Input ('Classic Buffer 
Overflow') ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aaa32c18b8ff194e31af3499eae15470ea0669b6

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aaa32c18b8ff194e31af3499eae15470ea0669b6
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] CVE-2023-6597/python: reference introductory commit

2024-04-29 Thread Sylvain Beucler (@beuc)


Sylvain Beucler pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8267dca4 by Sylvain Beucler at 2024-04-29T23:10:41+02:00
CVE-2023-6597/python: reference introductory commit

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -12408,6 +12408,7 @@ CVE-2023-6597 (An issue was found in the CPython 
`tempfile.TemporaryDirectory` c
NOTE: 
https://github.com/python/cpython/commit/8eaeefe49d179ca4908d052745e3bb8b6f238f82
 (v3.10.14)
NOTE: 
https://github.com/python/cpython/commit/d54e22a669ae6e987199bb5d2c69bb5a46b0083b
 (v3.9.19)
NOTE: 
https://mail.python.org/archives/list/security-annou...@python.org/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/
+   NOTE: Introduced by: 
https://github.com/python/cpython/commit/e9b51c0ad81da1da11ae65840ac8b50a8521373c
 (v3.8.0b1)
 CVE-2023-50966 (erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 
allow atta ...)
- erlang-jose  (bug #1067456)
NOTE: https://github.com/potatosalad/erlang-jose/issues/156



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8267dca495cbcd673ce4e3b6114070415fc100cc

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8267dca495cbcd673ce4e3b6114070415fc100cc
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] CVE-2024-31031/libcoap: buster not-affected + UB-related commits

2024-04-29 Thread Sylvain Beucler (@beuc)


Sylvain Beucler pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9f4efcf2 by Sylvain Beucler at 2024-04-29T22:40:40+02:00
CVE-2024-31031/libcoap: buster not-affected + UB-related commits

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -2455,13 +2455,16 @@ CVE-2024-31040 (Buffer Overflow vulnerability in the 
get_var_integer function in
NOT-FOR-US: NanoMQ
 CVE-2024-31031 (An issue in `coap_pdu.c` in libcoap 4.3.4 allows attackers to 
cause un ...)
- libcoap 
+   [buster] - libcoap  (Vulnerable code not present)
- libcoap2 
[bullseye] - libcoap2  (Minor issue)
[buster] - libcoap2  (Vulnerable code not present)
- libcoap3 
[bookworm] - libcoap3  (Minor issue)
NOTE: https://github.com/obgm/libcoap/issues/1351
-   NOTE: 
https://github.com/obgm/libcoap/commit/214665ac4b44b1b6a7e38d4d6907ee835a174928
+   NOTE: 
https://github.com/obgm/libcoap/commit/214665ac4b44b1b6a7e38d4d6907ee835a174928 
(develop)
+   NOTE: Introduced by: 
https://github.com/obgm/libcoap/commit/7033555d2978b8d4d5e16d43cfbfe1b1781c418f 
(v4.3.0-rc1)
+   NOTE: Introduced by: 
https://github.com/obgm/libcoap/commit/47a83549a80dad9a83f84cdfaba54c54defb5444 
(v4.3.2-rc1)
 CVE-2024-30990 (SQL Injection vulnerability in the "Invoices" page in 
phpgurukul Clien ...)
NOT-FOR-US: phpgurukul Client Management System
 CVE-2024-30989 (Cross Site Scripting vulnerability in /edit-client-details.php 
of phpg ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9f4efcf2a3c006d9a56b2de7b5e9a4a0160e515c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9f4efcf2a3c006d9a56b2de7b5e9a4a0160e515c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Process several NFUs

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a8baa332 by Salvatore Bonaccorso at 2024-04-29T22:24:09+02:00
Process several NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,89 +1,89 @@
 CVE-2024-4310 (Cross-site Scripting (XSS) vulnerability in HubBank affecting 
version  ...)
-   TODO: check
+   NOT-FOR-US: HubBank
 CVE-2024-4309 (SQL injection vulnerability in HubBank affecting version 1.0.2. 
This v ...)
-   TODO: check
+   NOT-FOR-US: HubBank
 CVE-2024-4308 (SQL injection vulnerability in HubBank affecting version 1.0.2. 
This v ...)
-   TODO: check
+   NOT-FOR-US: HubBank
 CVE-2024-4307 (SQL injection vulnerability in HubBank affecting version 1.0.2. 
This v ...)
-   TODO: check
+   NOT-FOR-US: HubBank
 CVE-2024-4306 (Critical unrestricted file upload vulnerability in HubBank 
affecting v ...)
-   TODO: check
+   NOT-FOR-US: HubBank
 CVE-2024-4304 (A Cross-Site Scripting XSS vulnerability has been detected on 
GT3 Solu ...)
-   TODO: check
+   NOT-FOR-US: GT3 Soluciones SWAL
 CVE-2024-3375 (Incorrect Permission Assignment for Critical Resource 
vulnerability in ...)
-   TODO: check
+   NOT-FOR-US: Havelsan Inc. Dialogue
 CVE-2024-34020 (A stack-based buffer overflow was found in the putSDN() 
function of ma ...)
TODO: check
 CVE-2024-34011 (Local privilege escalation due to insecure folder permissions. 
The fol ...)
-   TODO: check
+   NOT-FOR-US: Acronis Cyber Protect Cloud Agent
 CVE-2024-34010 (Local privilege escalation due to unquoted search path 
vulnerability.  ...)
-   TODO: check
+   NOT-FOR-US: Acronis Cyber Protect Cloud Agent
 CVE-2024-33684 (Missing Authorization vulnerability in Pdfcrowd Save as PDF 
plugin by  ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33652 (Missing Authorization vulnerability in Real Big Plugins Client 
Dash.Th ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33636 (Missing Authorization vulnerability in Mahesh Vora WP Page 
Post Widget ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33635 (Missing Authorization vulnerability in Piotnet Piotnet Addons 
For Elem ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33597 (Missing Authorization vulnerability in ProFaceOff SSU.This 
issue affec ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33596 (Missing Authorization vulnerability in Five Star Plugins Five 
Star Res ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33595 (Missing Authorization vulnerability in Jewel Theme Master 
Addons for E ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33594 (Missing Authorization vulnerability in Leaky Paywall.This 
issue affect ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33593 (Missing Authorization vulnerability in RedNao Smart Forms.This 
issue a ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33591 (Missing Authorization vulnerability in Tips and Tricks HQ Easy 
Accept  ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33590 (Server-Side Request Forgery (SSRF) vulnerability in codeSavory 
Knowled ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33589 (Missing Authorization vulnerability in WPOmnia KB Support.This 
issue a ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33588 (Missing Authorization vulnerability in codeSavory Knowledge 
Base docum ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33587 (Missing Authorization vulnerability in Copy Content Protection 
Team Se ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33586 (Missing Authorization vulnerability in Photo Gallery Team 
Photo Galler ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33585 (Missing Authorization vulnerability in Tyche Softwares Payment 
Gateway ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33558 (Missing Authorization vulnerability in 8theme XStore Core.This 
issue a ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33449 (An SSRF issue in the PDFMyURL service allows a remote attacker 
to obta ...)
-   TODO: check
+   NOT-FOR-US: PDFMyURL
 CVE-2024-33445 (An issue in hisiphp v2.0.111 allows a remote attacker to 
execute arbit ...)
TODO: check
 CVE-2024-33444 (SQL injection vulnerability in onethink v.1.1 allows a remote 
attacker ...)
-   TODO: check
+   NOT-FOR-US: onethink
 CVE-2024-33443 (An issue in onethink v.1.1 allows a remote attacker to execute 
arbitra ...)
-   TODO: check
+   NOT-FOR-US: onethink
 CVE-2024-33438 (File Upload vulnerability in CubeCart before 6.5.5 all

[Git][security-tracker-team/security-tracker][master] automatic update

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
796f8713 by security tracker role at 2024-04-29T20:12:21+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,3 +1,133 @@
+CVE-2024-4310 (Cross-site Scripting (XSS) vulnerability in HubBank affecting 
version  ...)
+   TODO: check
+CVE-2024-4309 (SQL injection vulnerability in HubBank affecting version 1.0.2. 
This v ...)
+   TODO: check
+CVE-2024-4308 (SQL injection vulnerability in HubBank affecting version 1.0.2. 
This v ...)
+   TODO: check
+CVE-2024-4307 (SQL injection vulnerability in HubBank affecting version 1.0.2. 
This v ...)
+   TODO: check
+CVE-2024-4306 (Critical unrestricted file upload vulnerability in HubBank 
affecting v ...)
+   TODO: check
+CVE-2024-4304 (A Cross-Site Scripting XSS vulnerability has been detected on 
GT3 Solu ...)
+   TODO: check
+CVE-2024-3375 (Incorrect Permission Assignment for Critical Resource 
vulnerability in ...)
+   TODO: check
+CVE-2024-34020 (A stack-based buffer overflow was found in the putSDN() 
function of ma ...)
+   TODO: check
+CVE-2024-34011 (Local privilege escalation due to insecure folder permissions. 
The fol ...)
+   TODO: check
+CVE-2024-34010 (Local privilege escalation due to unquoted search path 
vulnerability.  ...)
+   TODO: check
+CVE-2024-33684 (Missing Authorization vulnerability in Pdfcrowd Save as PDF 
plugin by  ...)
+   TODO: check
+CVE-2024-33652 (Missing Authorization vulnerability in Real Big Plugins Client 
Dash.Th ...)
+   TODO: check
+CVE-2024-33636 (Missing Authorization vulnerability in Mahesh Vora WP Page 
Post Widget ...)
+   TODO: check
+CVE-2024-33635 (Missing Authorization vulnerability in Piotnet Piotnet Addons 
For Elem ...)
+   TODO: check
+CVE-2024-33597 (Missing Authorization vulnerability in ProFaceOff SSU.This 
issue affec ...)
+   TODO: check
+CVE-2024-33596 (Missing Authorization vulnerability in Five Star Plugins Five 
Star Res ...)
+   TODO: check
+CVE-2024-33595 (Missing Authorization vulnerability in Jewel Theme Master 
Addons for E ...)
+   TODO: check
+CVE-2024-33594 (Missing Authorization vulnerability in Leaky Paywall.This 
issue affect ...)
+   TODO: check
+CVE-2024-33593 (Missing Authorization vulnerability in RedNao Smart Forms.This 
issue a ...)
+   TODO: check
+CVE-2024-33591 (Missing Authorization vulnerability in Tips and Tricks HQ Easy 
Accept  ...)
+   TODO: check
+CVE-2024-33590 (Server-Side Request Forgery (SSRF) vulnerability in codeSavory 
Knowled ...)
+   TODO: check
+CVE-2024-33589 (Missing Authorization vulnerability in WPOmnia KB Support.This 
issue a ...)
+   TODO: check
+CVE-2024-33588 (Missing Authorization vulnerability in codeSavory Knowledge 
Base docum ...)
+   TODO: check
+CVE-2024-33587 (Missing Authorization vulnerability in Copy Content Protection 
Team Se ...)
+   TODO: check
+CVE-2024-33586 (Missing Authorization vulnerability in Photo Gallery Team 
Photo Galler ...)
+   TODO: check
+CVE-2024-33585 (Missing Authorization vulnerability in Tyche Softwares Payment 
Gateway ...)
+   TODO: check
+CVE-2024-33558 (Missing Authorization vulnerability in 8theme XStore Core.This 
issue a ...)
+   TODO: check
+CVE-2024-33449 (An SSRF issue in the PDFMyURL service allows a remote attacker 
to obta ...)
+   TODO: check
+CVE-2024-33445 (An issue in hisiphp v2.0.111 allows a remote attacker to 
execute arbit ...)
+   TODO: check
+CVE-2024-33444 (SQL injection vulnerability in onethink v.1.1 allows a remote 
attacker ...)
+   TODO: check
+CVE-2024-33443 (An issue in onethink v.1.1 allows a remote attacker to execute 
arbitra ...)
+   TODO: check
+CVE-2024-33438 (File Upload vulnerability in CubeCart before 6.5.5 allows an 
authentic ...)
+   TODO: check
+CVE-2024-33435 (Insecure Permissions vulnerability in Guangzhou Yingshi 
Electronic Tec ...)
+   TODO: check
+CVE-2024-33345 (D-Link DIR-823G A1V1.0.2B05 was found to contain a 
Null-pointer derefe ...)
+   TODO: check
+CVE-2024-8 (Cross Site Scripting vulnerability in jizhicms v.2.5.4 allows 
a remote ...)
+   TODO: check
+CVE-2024-33276 (SQL Injection vulnerability in FME Modules 
preorderandnotication v.3.1 ...)
+   TODO: check
+CVE-2024-33272 (SQL injection vulnerability in KnowBand for PrestaShop 
autosuggest bef ...)
+   TODO: check
+CVE-2024-33271 (An issue in FME Modules eventsmanager before 4.4.0 allows an 
attacker  ...)
+   TODO: check
+CVE-2024-33269 (SQL Injection vulnerability in Prestaddons flashsales 1.9.7 
and before ...)
+   TODO: check
+CVE-2024-33268 (SQL Injection vulnerability in Digincube mdgiftproduct before 
1.4.1 al ...)
+   TODO: check
+CVE-2024-33266 (SQL Injection vulnerability in Helloshop 
deliveryorderautoupdate v.2.8 ...)
+

[Git][security-tracker-team/security-tracker][master] Track fixed version via unstable for CVE-2021-42521/vtk9

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
bb0a05f1 by Salvatore Bonaccorso at 2024-04-29T21:15:26+02:00
Track fixed version via unstable for CVE-2021-42521/vtk9

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -188987,7 +188987,7 @@ CVE-2021-42522 (There is a Information Disclosure 
vulnerability in anjuta/plugin
NOTE: https://gitlab.gnome.org/Archive/anjuta/-/issues/12
NOTE: Memory leak in GUI application, no security impact
 CVE-2021-42521 (There is a NULL pointer dereference vulnerability in VTK 
before 9.2.5, ...)
-   - vtk9  (bug #1031877)
+   - vtk9 9.1.0+really9.1.0+dfsg2-8 (bug #1031877)
[bookworm] - vtk9  (Minor issue)
[bullseye] - vtk9  (Minor issue)
- vtk7  (bug #1034844)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bb0a05f18ffad19522ed72334e3a4f79923cb759

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bb0a05f18ffad19522ed72334e3a4f79923cb759
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] LTS: claim apache2 in dla-needed.txt

2024-04-29 Thread Lee Garrett (@lgarrett)


Lee Garrett pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3ec5d605 by "Lee Garrett" at 2024-04-29T21:10:44+02:00
LTS: claim apache2 in dla-needed.txt
- - - - -


1 changed file:

- data/dla-needed.txt


Changes:

=
data/dla-needed.txt
=
@@ -30,7 +30,7 @@ ansible (Lee Garrett)
   NOTE: 20231217: Triaging done a few mail send upstream for claryfication 
purposes (rouca)
   NOTE: 20231228: Made a partial release DLA-3695-1 (rouca), waiting for lee
 --
-apache2
+apache2 (debian)
   NOTE: 20240418: Added by Front-Desk (apo)
 --
 astropy (Chris Lamb)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3ec5d6057e214fb4c997623ba2f6e4c480ceac9e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3ec5d6057e214fb4c997623ba2f6e4c480ceac9e
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Track fixed version via unstable for CVE-2023-52160/wpa

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7afd2984 by Salvatore Bonaccorso at 2024-04-29T20:59:01+02:00
Track fixed version via unstable for CVE-2023-52160/wpa

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -20582,7 +20582,7 @@ CVE-2023-40085 (In convertSubgraphFromHAL of 
ShimConverter.cpp, there is a possi
NOT-FOR-US: Android
 CVE-2023-52160 (The implementation of PEAP in wpa_supplicant through 2.10 
allows authe ...)
{DLA-3743-1}
-   - wpa  (bug #1064061)
+   - wpa 2:2.10-21.1 (bug #1064061)
NOTE: 
https://w1.fi/cgit/hostap/commit/?id=8e6485a1bcb0baffdea9e55255a81270b768439c
NOTE: https://www.top10vpn.com/research/wifi-vulnerabilities/
NOTE: 
https://lists.infradead.org/pipermail/hostap/2024-February/042362.html



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7afd298436c2475e45c906fc5c1b1d391f722f0c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7afd298436c2475e45c906fc5c1b1d391f722f0c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add upstream tag information for CVE-2024-31497

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5e7ac05d by Salvatore Bonaccorso at 2024-04-29T19:14:31+02:00
Add upstream tag information for CVE-2024-31497

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -3673,7 +3673,7 @@ CVE-2024-31497 (In PuTTY 0.68 through 0.80 before 0.81, 
biased ECDSA nonce gener
[buster] - filezilla  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2024/04/15/6
NOTE: 
https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
-   NOTE: 
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff_plain;h=c193fe9848f50a88a4089aac647fecc31ae96d27
+   NOTE: Fixed by: 
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=c193fe9848f50a88a4089aac647fecc31ae96d27
 (0.81)
 CVE-2024-3804 (A vulnerability, which was classified as critical, has been 
found in V ...)
NOT-FOR-US: Vesystem Cloud Desktop
 CVE-2024-3803 (A vulnerability classified as critical was found in Vesystem 
Cloud Des ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5e7ac05db6bccecb62f963ceaabd0acdf6a8c76c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5e7ac05db6bccecb62f963ceaabd0acdf6a8c76c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add reference for CVE-2024-0985

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8a0410a5 by Salvatore Bonaccorso at 2024-04-29T18:45:07+02:00
Add reference for CVE-2024-0985

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -22412,6 +22412,7 @@ CVE-2024-0985 (Late privilege drop in REFRESH 
MATERIALIZED VIEW CONCURRENTLY in
- postgresql-15 
- postgresql-13 
- postgresql-11 
+   NOTE: 
https://github.com/google/security-research/security/advisories/GHSA-9984-7hcf-v553
NOTE: https://www.postgresql.org/support/security/CVE-2024-0985/
NOTE: 
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=d6a61cb3bef3c8fbc35c2a6182e75a8c1d351e41
 (REL_16_2)
NOTE: 
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=f2fdea198b3d0ab30b9e8478a762488ecebabd88
 (REL_15_6)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8a0410a53b9192a609bfab3cbc4c6478646c7500

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8a0410a53b9192a609bfab3cbc4c6478646c7500
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Revert "Take wpa/dsa-needed"

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2d6627e2 by Salvatore Bonaccorso at 2024-04-29T17:48:33+02:00
Revert "Take wpa/dsa-needed"

This reverts commit 0aa44d8ad309f1dabb497928681692a70c0b43d5.

As explained already in c7deddcc1fc8 ("Revert "Add myself for
wpa/dsa-needed"").

- - - - -


1 changed file:

- data/dsa-needed.txt


Changes:

=
data/dsa-needed.txt
=
@@ -88,7 +88,7 @@ squid
 --
 webkit2gtk (berto)
 --
-wpa (rouca)
+wpa
 --
 zabbix
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2d6627e23519e289bc908116a21d0fd42521ba33

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2d6627e23519e289bc908116a21d0fd42521ba33
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] CVE-2024-31497

2024-04-29 Thread @rouca


Bastien Roucariès pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
4f9357ca by Bastien Roucariès at 2024-04-29T15:25:30+00:00
CVE-2024-31497

Add patch

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -3673,6 +3673,7 @@ CVE-2024-31497 (In PuTTY 0.68 through 0.80 before 0.81, 
biased ECDSA nonce gener
[buster] - filezilla  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2024/04/15/6
NOTE: 
https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
+   NOTE: 
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff_plain;h=c193fe9848f50a88a4089aac647fecc31ae96d27
 CVE-2024-3804 (A vulnerability, which was classified as critical, has been 
found in V ...)
NOT-FOR-US: Vesystem Cloud Desktop
 CVE-2024-3803 (A vulnerability classified as critical was found in Vesystem 
Cloud Des ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4f9357ca2048a1cfc9f4bfb3e2a3f92dbd56e642

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4f9357ca2048a1cfc9f4bfb3e2a3f92dbd56e642
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Take wpa/dsa-needed

2024-04-29 Thread @rouca


Bastien Roucariès pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0aa44d8a by Bastien Roucariès at 2024-04-29T15:19:26+00:00
Take wpa/dsa-needed

- - - - -


1 changed file:

- data/dsa-needed.txt


Changes:

=
data/dsa-needed.txt
=
@@ -88,7 +88,7 @@ squid
 --
 webkit2gtk (berto)
 --
-wpa
+wpa (rouca)
 --
 zabbix
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0aa44d8ad309f1dabb497928681692a70c0b43d5

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0aa44d8ad309f1dabb497928681692a70c0b43d5
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2024-33904/hyprland

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
088af36e by Salvatore Bonaccorso at 2024-04-29T16:55:19+02:00
Add CVE-2024-33904/hyprland

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -29,7 +29,7 @@ CVE-2024-3191 (A vulnerability, which was classified as 
critical, has been found
 CVE-2024-33905 (In Telegram WebK before 2.0.0 (488), a crafted Mini Web App 
allows XSS ...)
NOT-FOR-US: Telegram WebK
 CVE-2024-33904 (In plugins/HookSystem.cpp in Hyprland through 0.39.1 (before 
28c8561), ...)
-   TODO: check
+   - hyprland  (bug #1040971)
 CVE-2024-33903 (In CARLA through 0.9.15.2, the collision sensor mishandles 
some situat ...)
NOT-FOR-US: CARLA (carla-simulator)
 CVE-2024-33899 (RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows 
attacke ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/088af36e631f30703c002e0995caa188c7dd66ca

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/088af36e631f30703c002e0995caa188c7dd66ca
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Process some NFUs

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
86b96ef9 by Salvatore Bonaccorso at 2024-04-29T16:54:40+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,41 +1,41 @@
 CVE-2024-4303 (ArmorX Android APP's multi-factor authentication (MFA) for the 
login f ...)
-   TODO: check
+   NOT-FOR-US: ArmorX Android APP's multi-factor authentication (MFA)
 CVE-2024-4302 (Super 8 Live Chat online customer service platform fails to 
properly f ...)
NOT-FOR-US: Super 8 Live Chat online customer service platform
 CVE-2024-4301 (N-Reporter and N-Cloud, products of the N-Partner, have an OS 
Command  ...)
-   TODO: check
+   NOT-FOR-US: N-Reporter
 CVE-2024-4300 (E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive 
information in  ...)
-   TODO: check
+   NOT-FOR-US: E-WEBInformationCo. FS-EZViewer(Web)
 CVE-2024-4299 (The system configuration interface of HGiga iSherlock 
(including MailS ...)
-   TODO: check
+   NOT-FOR-US: HGiga iSherlock
 CVE-2024-4298 (The email search interface of HGiga iSherlock (including 
MailSherlock, ...)
-   TODO: check
+   NOT-FOR-US: HGiga iSherlock
 CVE-2024-4297 (The system configuration interface of HGiga iSherlock 
(including MailS ...)
-   TODO: check
+   NOT-FOR-US: HGiga iSherlock
 CVE-2024-4296 (The account management interface of HGiga iSherlock (including 
MailShe ...)
-   TODO: check
+   NOT-FOR-US: HGiga iSherlock
 CVE-2024-3196 (A vulnerability was found in MailCleaner up to 2023.03.14. It 
has been ...)
-   TODO: check
+   NOT-FOR-US: MailCleaner
 CVE-2024-3195 (A vulnerability was found in MailCleaner up to 2023.03.14. It 
has been ...)
-   TODO: check
+   NOT-FOR-US: MailCleaner
 CVE-2024-3194 (A vulnerability was found in MailCleaner up to 2023.03.14 and 
classifi ...)
-   TODO: check
+   NOT-FOR-US: MailCleaner
 CVE-2024-3193 (A vulnerability has been found in MailCleaner up to 2023.03.14 
and cla ...)
-   TODO: check
+   NOT-FOR-US: MailCleaner
 CVE-2024-3192 (A vulnerability, which was classified as problematic, was found 
in Mai ...)
-   TODO: check
+   NOT-FOR-US: MailCleaner
 CVE-2024-3191 (A vulnerability, which was classified as critical, has been 
found in M ...)
-   TODO: check
+   NOT-FOR-US: MailCleaner
 CVE-2024-33905 (In Telegram WebK before 2.0.0 (488), a crafted Mini Web App 
allows XSS ...)
-   TODO: check
+   NOT-FOR-US: Telegram WebK
 CVE-2024-33904 (In plugins/HookSystem.cpp in Hyprland through 0.39.1 (before 
28c8561), ...)
TODO: check
 CVE-2024-33903 (In CARLA through 0.9.15.2, the collision sensor mishandles 
some situat ...)
-   TODO: check
+   NOT-FOR-US: CARLA (carla-simulator)
 CVE-2024-33899 (RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows 
attacke ...)
TODO: check
 CVE-2024-33891 (Delinea Secret Server before 11.7.01 allows attackers to 
bypass au ...)
-   TODO: check
+   NOT-FOR-US: Delinea Secret Server
 CVE-2024-33686 (Missing Authorization vulnerability in Extend Themes Pathway, 
Extend T ...)
NOT-FOR-US: WordPress themes
 CVE-2024-33681 (Cross-Site Request Forgery (CSRF) vulnerability in Sandor 
Kovacs Regen ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/86b96ef978028d25628936ec5a9fed96838bee82

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/86b96ef978028d25628936ec5a9fed96838bee82
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] CVE-2024-20203, CVE-2024-20204 affect Org-mode too -- same code

2024-04-29 Thread Sean Whitton (@spwhitton)


Sean Whitton pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
50131006 by Sean Whitton at 2024-04-29T14:10:06+01:00
CVE-2024-20203, CVE-2024-20204 affect Org-mode too -- same code

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -10696,6 +10696,9 @@ CVE-2024-30204 (In Emacs before 29.3, LaTeX preview is 
enabled by default for e-
- emacs 1:29.3+1-1 (bug #1067630)
[bookworm] - emacs  (Minor issue, will be fixed via point 
release)
[bullseye] - emacs  (Minor issue, will be fixed via point 
release)
+   - org-mode 9.6.23+dfsg-1 (bug #1067663)
+   [bookworm] - org-mode  (Produces only a dependency binary 
package)
+   [bullseye] - org-mode  (Minor issue; can be fixed via point 
release)
NOTE: https://www.openwall.com/lists/oss-security/2024/03/24/1
NOTE: https://lists.gnu.org/archive/html/info-gnu/2024-03/msg5.html
NOTE: 
https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=6f9ea396f49cbe38c2173e0a72ba6af3e03b271c
 (emacs-29.3)
@@ -10705,6 +10708,9 @@ CVE-2024-30203 (In Emacs before 29.3, Gnus treats 
inline MIME contents as truste
- emacs 1:29.3+1-1 (bug #1067630)
[bookworm] - emacs  (Minor issue, will be fixed via point 
release)
[bullseye] - emacs  (Minor issue, will be fixed via point 
release)
+   - org-mode 9.6.23+dfsg-1 (bug #1067663)
+   [bookworm] - org-mode  (Produces only a dependency binary 
package)
+   [bullseye] - org-mode  (Minor issue; can be fixed via point 
release)
NOTE: https://www.openwall.com/lists/oss-security/2024/03/24/1
NOTE: https://lists.gnu.org/archive/html/info-gnu/2024-03/msg5.html
NOTE: 
https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=937b9042ad7426acdcca33e3d931d8f495bdd804
 (emacs-29.3)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/50131006a9159cb9bed10204a62de0e015810de2

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/50131006a9159cb9bed10204a62de0e015810de2
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Reserve DLA-3801-1 for emacs

2024-04-29 Thread Sean Whitton (@spwhitton)


Sean Whitton pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
71c6a7ff by Sean Whitton at 2024-04-29T13:50:47+01:00
Reserve DLA-3801-1 for emacs

- - - - -


2 changed files:

- data/DLA/list
- data/dla-needed.txt


Changes:

=
data/DLA/list
=
@@ -1,3 +1,6 @@
+[29 Apr 2024] DLA-3801-1 emacs - security update
+   {CVE-2024-30203 CVE-2024-30204 CVE-2024-30205}
+   [buster] - emacs 1:26.1+1-3.2+deb10u5
 [29 Apr 2024] DLA-3800-1 ruby-rack - security update
{CVE-2024-25126 CVE-2024-26141 CVE-2024-26146}
[buster] - ruby-rack 2.0.6-3+deb10u4


=
data/dla-needed.txt
=
@@ -81,15 +81,6 @@ edk2
   NOTE: 20231230: CVE-2019-11098 fixed via bullseye 11.2 (lamby)
   NOTE: 20240312: CVE-2023-48733 fixed via DSA-5624-1 (Beuc/front-desk)
 --
-emacs (Sean Whitton)
-  NOTE: 20240403: Added by Front-Desk (lamby)
-  NOTE: 20240403: Needs someone with a little familiarity with Lisp — by my
-  NOTE: 20240403: eye, the version of emacs in LTS may not be vulnerable to,
-  NOTE: 20240403: for example, CVE-2024-30202. But I think it is vulnerable
-  NOTE: 20240403: to CVE-2024-30203. (lamby)
-  NOTE: 20240422: Making progress through bookworm,bullseye,buster.
-  NOTE: 20240422: No major blockers, just taking some backporting.  (spwhitton)
---
 freeimage
   NOTE: 20240320: Added by Front-Desk (ta)
   NOTE: 20240320: lots of postponed issue could be fixed as well



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/71c6a7ffaa6c4244d67cd0f25c4f9ae0c2deae2d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/71c6a7ffaa6c4244d67cd0f25c4f9ae0c2deae2d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Actually mark CVE-2024-1135/gunicorn as postponed for buster LTS.

2024-04-29 Thread Chris Lamb (@lamby)


Chris Lamb pushed to branch master at Debian Security Tracker / security-tracker


Commits:
784afb10 by Chris Lamb at 2024-04-29T12:35:32+01:00
Actually mark CVE-2024-1135/gunicorn as postponed for buster LTS.

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=
data/CVE/list
=
@@ -3654,6 +3654,7 @@ CVE-2024-1135 (Gunicorn fails to properly validate 
Transfer-Encoding headers, le
- gunicorn  (bug #1069126)
[bookworm] - gunicorn  (Minor issue)
[bullseye] - gunicorn  (Minor issue)
+   [buster] - gunicorn  (Minor issue)
NOTE: https://huntr.com/bounties/22158e34-cfd5-41ad-97e0-a780773d96c1
NOTE: 
https://github.com/benoitc/gunicorn/commit/ac29c9b0a758d21f1e0fb3b3457239e523fa9f1d
 CVE-2024-0549 (mintplex-labs/anything-llm is vulnerable to a relative path 
traversal  ...)


=
data/dla-needed.txt
=
@@ -104,9 +104,6 @@ freeimage
 glibc (Adrian Bunk)
   NOTE: 20240419: Added by coordinator (santiago)
 --
-gunicorn (Chris Lamb)
-  NOTE: 20240421: Added by Front-Desk (apo)
---
 h2o (dleidert)
   NOTE: 20231228: Added by Front-Desk (lamby)
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/784afb10403ea7c8da0854a4d241fc5c611e3bd5

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/784afb10403ea7c8da0854a4d241fc5c611e3bd5
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] data/dla-needed.txt: Claim gunicorn.

2024-04-29 Thread Chris Lamb (@lamby)


Chris Lamb pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9e76d436 by Chris Lamb at 2024-04-29T12:21:52+01:00
data/dla-needed.txt: Claim gunicorn.

- - - - -


1 changed file:

- data/dla-needed.txt


Changes:

=
data/dla-needed.txt
=
@@ -104,7 +104,7 @@ freeimage
 glibc (Adrian Bunk)
   NOTE: 20240419: Added by coordinator (santiago)
 --
-gunicorn
+gunicorn (Chris Lamb)
   NOTE: 20240421: Added by Front-Desk (apo)
 --
 h2o (dleidert)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9e76d4369a8e3136ecb730b89b37c28437bab788

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9e76d4369a8e3136ecb730b89b37c28437bab788
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] dla-needed.txt: Update name for ansible claim (based on commit message).

2024-04-29 Thread Chris Lamb (@lamby)


Chris Lamb pushed to branch master at Debian Security Tracker / security-tracker


Commits:
fd6f0df9 by Chris Lamb at 2024-04-29T12:20:19+01:00
dla-needed.txt: Update name for ansible claim (based on commit message).

- - - - -


1 changed file:

- data/dla-needed.txt


Changes:

=
data/dla-needed.txt
=
@@ -21,7 +21,7 @@ To make it easier to see the entire history of an update, 
please append notes
 rather than remove/replace existing ones.
 
 --
-ansible (debian)
+ansible (Lee Garrett)
   NOTE: 20231202: Added by Front-Desk (Beuc)
   NOTE: 20231202: Supported package, but there's a CVE backlog, and no updates 
since 2021
   NOTE: 20231202: (neither in LTS nor in stable/oldstable), so this is an 
opportunity to



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fd6f0df96038a01cf66456655b0349eee08822b2

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fd6f0df96038a01cf66456655b0349eee08822b2
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] samba/buster: tidy remaining CVEs

2024-04-29 Thread Sylvain Beucler (@beuc)


Sylvain Beucler pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c9168180 by Sylvain Beucler at 2024-04-29T12:29:15+02:00
samba/buster: tidy remaining CVEs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -141195,6 +141195,7 @@ CVE-2022-32743 (Samba does not validate the 
Validated-DNS-Host-Name right for th
[experimental] - samba 2:4.17.0+dfsg-1
- samba 2:4.17.2+dfsg-3 (bug #1021022)
[bullseye] - samba  (Minor issue)
+   [buster] - samba  (Minor issue)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14833
 CVE-2022-32742 (A flaw was found in Samba. Some SMB1 write requests were not 
correctly ...)
{DSA-5205-1 DLA-3792-1}
@@ -195401,7 +195402,7 @@ CVE-2021-40146 (A Remote Code Execution (RCE) 
vulnerability was discovered in th
 CVE-2021-3738 (In DCE/RPC it is possible to share the handles (cookies for 
resource s ...)
{DSA-5003-1}
- samba 2:4.13.14+dfsg-1
-   [buster] - samba  (Minor issue; affects Samba as AD DC)
+   [buster] - samba  (Domain controller functionality is EOLed, 
see DSA-5015-1)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14468
NOTE: https://www.samba.org/samba/security/CVE-2021-3738.html
 CVE-2021-3737 (A flaw was found in python. An improperly handled HTTP response 
in the ...)
@@ -201660,7 +201661,7 @@ CVE-2021-3671 (A null pointer de-reference was found 
in the way samba kerberos s
[stretch] - heimdal  (Minor issue)
- samba 2:4.13.13+dfsg-1
[bullseye] - samba 2:4.13.13+dfsg-1~deb11u1
-   [buster] - samba  (Minor issue)
+   [buster] - samba  (Domain controller functionality is EOLed, 
see DSA-5015-1)
[stretch] - samba  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2013080
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14770



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c9168180d58fc5f3eaecdcaf8b6e2370d2f661f0

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c9168180d58fc5f3eaecdcaf8b6e2370d2f661f0
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] CVE-2023-45288/golang-1.11: buster postponed

2024-04-29 Thread Sylvain Beucler (@beuc)


Sylvain Beucler pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7f3c929e by Sylvain Beucler at 2024-04-29T11:59:52+02:00
CVE-2023-45288/golang-1.11: buster postponed

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -7333,6 +7333,7 @@ CVE-2023-45288 (An attacker may cause an HTTP/2 endpoint 
to read arbitrary amoun
- golang-1.15 
[bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
+   [buster] - golang-1.11  (Limited support, minor issue, 
follow bullseye DSAs/point-releases)
- golang-golang-x-net 1:0.23.0+dfsg-1
NOTE: https://github.com/golang/go/issues/65051
NOTE: 
https://github.com/golang/go/commit/e55d7cf8435ba4e58d4a5694e63b391821d4ee9b 
(go1.22.2)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7f3c929ee1899a1fb8a8ed8ba0b1b0387565e6f7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7f3c929ee1899a1fb8a8ed8ba0b1b0387565e6f7
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Process NFUs

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5e6a1c60 by Salvatore Bonaccorso at 2024-04-29T11:42:21+02:00
Process NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,7 +1,7 @@
 CVE-2024-4303 (ArmorX Android APP's multi-factor authentication (MFA) for the 
login f ...)
TODO: check
 CVE-2024-4302 (Super 8 Live Chat online customer service platform fails to 
properly f ...)
-   TODO: check
+   NOT-FOR-US: Super 8 Live Chat online customer service platform
 CVE-2024-4301 (N-Reporter and N-Cloud, products of the N-Partner, have an OS 
Command  ...)
TODO: check
 CVE-2024-4300 (E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive 
information in  ...)
@@ -37,73 +37,73 @@ CVE-2024-33899 (RARLAB WinRAR before 7.00, on Linux and 
UNIX platforms, allows a
 CVE-2024-33891 (Delinea Secret Server before 11.7.01 allows attackers to 
bypass au ...)
TODO: check
 CVE-2024-33686 (Missing Authorization vulnerability in Extend Themes Pathway, 
Extend T ...)
-   TODO: check
+   NOT-FOR-US: WordPress themes
 CVE-2024-33681 (Cross-Site Request Forgery (CSRF) vulnerability in Sandor 
Kovacs Regen ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33649 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33648 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33646 (Cross-Site Request Forgery (CSRF) vulnerability in Toast 
Plugins Stick ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33645 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33643 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33641 (Deserialization of Untrusted Data vulnerability in Team Yoast 
Custom f ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33640 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33637 (Insertion of Sensitive Information into Log File vulnerability 
in Soli ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33634 (Server-Side Request Forgery (SSRF) vulnerability in Piotnet 
Piotnet Ad ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33633 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33632 (Cross-Site Request Forgery (CSRF) vulnerability in Piotnet 
Piotnet Add ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33631 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33630 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33629 (Server-Side Request Forgery (SSRF) vulnerability in Creative 
Motion Au ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33627 (Server-Side Request Forgery (SSRF) vulnerability in Cusmin 
Absolutely  ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33584 (URL Redirection to Untrusted Site ('Open Redirect') 
vulnerability in D ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33575 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33571 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33566 (Missing Authorization vulnerability in N-Media OrderConvo 
allows OS Co ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33562 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33559 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33554 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33553 (Deserialization of Untrusted Data vulnerability in 8theme 
XStore Core. ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-33551 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2024-

[Git][security-tracker-team/security-tracker][master] CVE-2024-30202,CVE-2024-30203/emacs,org-mode: precise commit versions

2024-04-29 Thread Sylvain Beucler (@beuc)


Sylvain Beucler pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ac058e87 by Sylvain Beucler at 2024-04-29T11:30:17+02:00
CVE-2024-30202,CVE-2024-30203/emacs,org-mode: precise commit versions

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -10696,7 +10696,7 @@ CVE-2024-30204 (In Emacs before 29.3, LaTeX preview is 
enabled by default for e-
[bullseye] - emacs  (Minor issue, will be fixed via point 
release)
NOTE: https://www.openwall.com/lists/oss-security/2024/03/24/1
NOTE: https://lists.gnu.org/archive/html/info-gnu/2024-03/msg5.html
-   NOTE: 
https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=6f9ea396f49cbe38c2173e0a72ba6af3e03b271c
+   NOTE: 
https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=6f9ea396f49cbe38c2173e0a72ba6af3e03b271c
 (emacs-29.3)
NOTE: org-mode/9.5.2+dfsh-5 dropped all lisp files from the produced 
binary packages
NOTE: making an empty dependency package only.
 CVE-2024-30203 (In Emacs before 29.3, Gnus treats inline MIME contents as 
trusted.)
@@ -10705,7 +10705,7 @@ CVE-2024-30203 (In Emacs before 29.3, Gnus treats 
inline MIME contents as truste
[bullseye] - emacs  (Minor issue, will be fixed via point 
release)
NOTE: https://www.openwall.com/lists/oss-security/2024/03/24/1
NOTE: https://lists.gnu.org/archive/html/info-gnu/2024-03/msg5.html
-   NOTE: 
https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=937b9042ad7426acdcca33e3d931d8f495bdd804
+   NOTE: 
https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=937b9042ad7426acdcca33e3d931d8f495bdd804
 (emacs-29.3)
 CVE-2024-30202 (In Emacs before 29.3, arbitrary Lisp code is evaluated as part 
of turn ...)
- emacs 1:29.3+1-1 (bug #1067630)
[bookworm] - emacs  (Minor issue, will be fixed via point 
release)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ac058e87d90e9aab94a12d26b39f1cd98ae3828c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ac058e87d90e9aab94a12d26b39f1cd98ae3828c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] 2 commits: CVE-2024-30202/emacs,org-mode: precise commit versions

2024-04-29 Thread Sylvain Beucler (@beuc)


Sylvain Beucler pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d28a91c3 by Sylvain Beucler at 2024-04-29T11:26:53+02:00
CVE-2024-30202/emacs,org-mode: precise commit versions

- - - - -
14f3d07e by Sylvain Beucler at 2024-04-29T11:26:53+02:00
CVE-2024-30205/emacs,org-mode: precise commit versions

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -10687,9 +10687,9 @@ CVE-2024-30205 (In Emacs before 29.3, Org mode 
considers contents of remote file
[bullseye] - org-mode  (Minor issue; can be fixed via point 
release)
NOTE: https://www.openwall.com/lists/oss-security/2024/03/24/1
NOTE: https://lists.gnu.org/archive/html/info-gnu/2024-03/msg5.html
-   NOTE: 
https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=2bc865ace050ff118db43f01457f95f95112b877
+   NOTE: 
https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=2bc865ace050ff118db43f01457f95f95112b877
 (emacs-29.3)
NOTE: https://list.orgmode.org/87o7b3eczr@bzg.fr/T/#t
-   NOTE: 
https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=4255d5dcc0657915f90e4fba7e0a5514cced514d
+   NOTE: 
https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=4255d5dcc0657915f90e4fba7e0a5514cced514d
 (release_9.6.23)
 CVE-2024-30204 (In Emacs before 29.3, LaTeX preview is enabled by default for 
e-mail a ...)
- emacs 1:29.3+1-1 (bug #1067630)
[bookworm] - emacs  (Minor issue, will be fixed via point 
release)
@@ -10719,8 +10719,9 @@ CVE-2024-30202 (In Emacs before 29.3, arbitrary Lisp 
code is evaluated as part o
NOTE: https://lists.gnu.org/archive/html/info-gnu/2024-03/msg5.html
NOTE: 
https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=befa9fcaae29a6c9a283ba371c3c5234c7f644eb
NOTE: https://list.orgmode.org/87o7b3eczr@bzg.fr/T/#t
-   NOTE: 
https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=003ddacf1c8d869b1858181c29ea21b731a8d8d9
-   NOTE: Introduced by: 
https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=8abdbbee395f284f2262a89187d662eaf40080b1
+   NOTE: 
https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=003ddacf1c8d869b1858181c29ea21b731a8d8d9
 (release_9.6.23)
+   NOTE: Introduced by: 
https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=8abdbbee395f284f2262a89187d662eaf40080b1
 (release_9.5)
+   NOTE: Introduced by: 
https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=bf9ec3d91a79414deac039f7bf83352a9b0a9a85
 (emacs-28.0.90)
NOTE: org-mode/9.5.2+dfsh-5 dropped all lisp files from the produced 
binary packages
NOTE: making an empty dependency package only.
 CVE-2024-2865 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/0388317923da14943723872f5d267e5613c31b01...14f3d07e974300c9db0ac010f8904a2deefecd32

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/0388317923da14943723872f5d267e5613c31b01...14f3d07e974300c9db0ac010f8904a2deefecd32
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Reserve DLA-3800-1 for ruby-rack

2024-04-29 Thread Adrian Bunk (@bunk)


Adrian Bunk pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
03883179 by Adrian Bunk at 2024-04-29T12:26:12+03:00
Reserve DLA-3800-1 for ruby-rack

- - - - -


2 changed files:

- data/DLA/list
- data/dla-needed.txt


Changes:

=
data/DLA/list
=
@@ -1,3 +1,6 @@
+[29 Apr 2024] DLA-3800-1 ruby-rack - security update
+   {CVE-2024-25126 CVE-2024-26141 CVE-2024-26146}
+   [buster] - ruby-rack 2.0.6-3+deb10u4
 [28 Apr 2024] DLA-3799-1 trafficserver - security update
{CVE-2024-31309}
[buster] - trafficserver 8.1.7-0+deb10u4


=
data/dla-needed.txt
=
@@ -258,10 +258,6 @@ ring
   NOTE: 20230903: Added by Front-Desk (gladk)
   NOTE: 20230928: will be likely hard to fix see 
https://lists.debian.org/debian-lts/2023/09/msg00035.html (rouca)
 --
-ruby-rack (Adrian Bunk)
-  NOTE: 20240306: Added by Front-Desk (opal)
-  NOTE: 20240408: waiting for feedback from Debian maintainer (bunk)
---
 runc (dleidert)
   NOTE: 20240312: Added by coordinator (roberto)
   NOTE: 20240314: Several CVEs fixed in LTS remain unfixed (no-dsa) in 
bullseye.



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0388317923da14943723872f5d267e5613c31b01

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0388317923da14943723872f5d267e5613c31b01
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] LTS: reclaim org-mode

2024-04-29 Thread Sean Whitton (@spwhitton)


Sean Whitton pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8fd3cf99 by Sean Whitton at 2024-04-29T09:31:58+01:00
LTS: reclaim org-mode

- - - - -


1 changed file:

- data/dla-needed.txt


Changes:

=
data/dla-needed.txt
=
@@ -213,7 +213,7 @@ nvidia-graphics-drivers-legacy-390xx
   NOTE: 20240303: Added by Front-Desk (apo)
   NOTE: 20240303: See comment for nvidia-graphics-drivers. (apo/front-desk)
 --
-org-mode
+org-mode (Sean Whitton)
   NOTE: 20240405: Added by Front-Desk (lamby)
 --
 pdns-recursor



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8fd3cf9986d2162f6e755b5f5f2144ace406790d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8fd3cf9986d2162f6e755b5f5f2144ace406790d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] CVE-2023-51794/qemu: buster postponed

2024-04-29 Thread Sylvain Beucler (@beuc)


Sylvain Beucler pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
bde8f63a by Sylvain Beucler at 2024-04-29T10:24:33+02:00
CVE-2023-51794/qemu: buster postponed

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -538,6 +538,7 @@ CVE-2023-51794 (Buffer Overflow vulnerability in Ffmpeg 
v.N113007-g8d24a28d06 al
- ffmpeg 
[bookworm] - ffmpeg  (Pick up when fixed in 5.1.x)
[bullseye] - ffmpeg  (Pick up when fixed in 4.3.x)
+   [buster] - ffmpeg  (Pick up when fixed in 4.1.x)
NOTE: https://trac.ffmpeg.org/ticket/10746
NOTE: Fixed in 
https://github.com/ffmpeg/FFmpeg/commit/50f0f8c53c818f73fe2d752708e2fa9d2a2d8a07
 (n7.0)
 CVE-2023-51365 (A path traversal vulnerability has been reported to affect 
several QNA ...)
@@ -2297,7 +2298,7 @@ CVE-2024-31582 (FFmpeg version n6.1 was discovered to 
contain a heap buffer over
- ffmpeg 
[bookworm] - ffmpeg  (Pick up when fixed in 5.1.x)
[bullseye] - ffmpeg  (Pick up when fixed in 4.3.x)
-   [buster] - ffmpeg  (Pick up when fixed in 4.3.x)
+   [buster] - ffmpeg  (Pick up when fixed in 4.1.x)
NOTE: Fixed by 
https://github.com/ffmpeg/ffmpeg/commit/99debe5f823f45a482e1dc08de35879aa9c74bd2
 (n7.0)
 CVE-2024-31581 (FFmpeg version n6.1 was discovered to contain an improper 
validation o ...)
[experimental] - ffmpeg 7:7.0-1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bde8f63a44ded7717328ac0e0526cb864f913db9

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bde8f63a44ded7717328ac0e0526cb864f913db9
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] automatic update

2024-04-29 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0f8fa9a7 by security tracker role at 2024-04-29T08:12:12+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,3 +1,119 @@
+CVE-2024-4303 (ArmorX Android APP's multi-factor authentication (MFA) for the 
login f ...)
+   TODO: check
+CVE-2024-4302 (Super 8 Live Chat online customer service platform fails to 
properly f ...)
+   TODO: check
+CVE-2024-4301 (N-Reporter and N-Cloud, products of the N-Partner, have an OS 
Command  ...)
+   TODO: check
+CVE-2024-4300 (E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive 
information in  ...)
+   TODO: check
+CVE-2024-4299 (The system configuration interface of HGiga iSherlock 
(including MailS ...)
+   TODO: check
+CVE-2024-4298 (The email search interface of HGiga iSherlock (including 
MailSherlock, ...)
+   TODO: check
+CVE-2024-4297 (The system configuration interface of HGiga iSherlock 
(including MailS ...)
+   TODO: check
+CVE-2024-4296 (The account management interface of HGiga iSherlock (including 
MailShe ...)
+   TODO: check
+CVE-2024-3196 (A vulnerability was found in MailCleaner up to 2023.03.14. It 
has been ...)
+   TODO: check
+CVE-2024-3195 (A vulnerability was found in MailCleaner up to 2023.03.14. It 
has been ...)
+   TODO: check
+CVE-2024-3194 (A vulnerability was found in MailCleaner up to 2023.03.14 and 
classifi ...)
+   TODO: check
+CVE-2024-3193 (A vulnerability has been found in MailCleaner up to 2023.03.14 
and cla ...)
+   TODO: check
+CVE-2024-3192 (A vulnerability, which was classified as problematic, was found 
in Mai ...)
+   TODO: check
+CVE-2024-3191 (A vulnerability, which was classified as critical, has been 
found in M ...)
+   TODO: check
+CVE-2024-33905 (In Telegram WebK before 2.0.0 (488), a crafted Mini Web App 
allows XSS ...)
+   TODO: check
+CVE-2024-33904 (In plugins/HookSystem.cpp in Hyprland through 0.39.1 (before 
28c8561), ...)
+   TODO: check
+CVE-2024-33903 (In CARLA through 0.9.15.2, the collision sensor mishandles 
some situat ...)
+   TODO: check
+CVE-2024-33899 (RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows 
attacke ...)
+   TODO: check
+CVE-2024-33891 (Delinea Secret Server before 11.7.01 allows attackers to 
bypass au ...)
+   TODO: check
+CVE-2024-33686 (Missing Authorization vulnerability in Extend Themes Pathway, 
Extend T ...)
+   TODO: check
+CVE-2024-33681 (Cross-Site Request Forgery (CSRF) vulnerability in Sandor 
Kovacs Regen ...)
+   TODO: check
+CVE-2024-33649 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+   TODO: check
+CVE-2024-33648 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+   TODO: check
+CVE-2024-33646 (Cross-Site Request Forgery (CSRF) vulnerability in Toast 
Plugins Stick ...)
+   TODO: check
+CVE-2024-33645 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+   TODO: check
+CVE-2024-33643 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+   TODO: check
+CVE-2024-33641 (Deserialization of Untrusted Data vulnerability in Team Yoast 
Custom f ...)
+   TODO: check
+CVE-2024-33640 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+   TODO: check
+CVE-2024-33637 (Insertion of Sensitive Information into Log File vulnerability 
in Soli ...)
+   TODO: check
+CVE-2024-33634 (Server-Side Request Forgery (SSRF) vulnerability in Piotnet 
Piotnet Ad ...)
+   TODO: check
+CVE-2024-33633 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+   TODO: check
+CVE-2024-33632 (Cross-Site Request Forgery (CSRF) vulnerability in Piotnet 
Piotnet Add ...)
+   TODO: check
+CVE-2024-33631 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+   TODO: check
+CVE-2024-33630 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+   TODO: check
+CVE-2024-33629 (Server-Side Request Forgery (SSRF) vulnerability in Creative 
Motion Au ...)
+   TODO: check
+CVE-2024-33627 (Server-Side Request Forgery (SSRF) vulnerability in Cusmin 
Absolutely  ...)
+   TODO: check
+CVE-2024-33584 (URL Redirection to Untrusted Site ('Open Redirect') 
vulnerability in D ...)
+   TODO: check
+CVE-2024-33575 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+   TODO: check
+CVE-2024-33571 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+   TODO: check
+CVE-2024-33566 (Missing Authorization vulnerability in N-Media OrderConvo 
allows OS Co ...)
+   TODO: check
+CVE-2024-33562 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+