Bug#1041099: r-cran-commonmark: CVE-2023-37463

2023-07-14 Thread Moritz Mühlenhoff
Source: r-cran-commonmark X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for r-cran-commonmark. CVE-2023-37463[0]: | cmark-gfm is an extended version of the C reference implementation | of CommonMark, a rationalized

Bug#1041098: python-cmarkgfm: CVE-2023-37463

2023-07-14 Thread Moritz Mühlenhoff
Source: python-cmarkgfm X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for python-cmarkgfm. CVE-2023-37463[0]: | cmark-gfm is an extended version of the C reference implementation | of CommonMark, a rationalized version of

Bug#1041097: cmark-gfm: CVE-2023-37463

2023-07-14 Thread Moritz Mühlenhoff
Source: cmark-gfm X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for cmark-gfm. CVE-2023-37463[0]: | cmark-gfm is an extended version of the C reference implementation | of CommonMark, a rationalized version of Markdown

Bug#1040597: orthanc: CVE-2023-33466

2023-07-07 Thread Moritz Mühlenhoff
Source: orthanc X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for orthanc. CVE-2023-33466[0]: | Orthanc before 1.12.0 allows authenticated users with access to the | Orthanc API to overwrite arbitrary files on the file

Bug#1040595: yt-dlp: CVE-2023-35934

2023-07-07 Thread Moritz Mühlenhoff
Source: yt-dlp X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for yt-dlp. CVE-2023-35934[0]: | yt-dlp is a command-line program to download videos from video | sites. During file downloads, yt-dlp or the external

Bug#1040593: kodi: CVE-2023-30207

2023-07-07 Thread Moritz Mühlenhoff
Source: kodi X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerability was published for kodi. CVE-2023-30207[0]: | A divide by zero issue discovered in Kodi Home Theater Software 19.5 | and earlier allows attackers to cause a denial of service via

Bug#1040594: libcoap3: CVE-2023-30362

2023-07-07 Thread Moritz Mühlenhoff
Source: libcoap3 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for libcoap3. CVE-2023-30362[0]: | Buffer Overflow vulnerability in coap_send function in libcoap | library 4.3.1-103-g52cfd56 fixed in 4.3.1-120-ge242200

Bug#1040592: node-dottie: CVE-2023-26132

2023-07-07 Thread Moritz Mühlenhoff
Source: node-dottie X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for node-dottie. CVE-2023-26132[0]: | Versions of the package dottie before 2.0.4 are vulnerable to | Prototype Pollution due to insufficient checks, via

Bug#877512: slapd: enabled systemd integration (untested patch)

2023-06-29 Thread Moritz Mühlenhoff
Am Wed, Jun 28, 2023 at 01:03:33PM -0700 schrieb Ryan Tandy: > Hmm. So on upgrade I suppose we would want to automatically migrate those > settings to a drop-in? That actually sounds doable; such a drop-in would > probably not have to be a conffile. Indeed, so my idea was that e.g. the systemd

Bug#877512: slapd: enabled systemd integration (untested patch)

2023-06-28 Thread Moritz Mühlenhoff
Am Wed, Jun 28, 2023 at 09:49:06AM -0700 schrieb Ryan Tandy: > On Wed, Jun 28, 2023 at 06:29:31PM +0200, Andreas Henriksson wrote: > > I'm attaching a patch which has only been compile-tested as I don't > > use slapd myself. It would be great if someone who uses slapd could > > pick it up, test it

Bug#1021292: Enabling branch protection on amd64 and arm64

2023-06-27 Thread Moritz Mühlenhoff
Am Wed, Jun 21, 2023 at 05:41:36PM +0200 schrieb Emanuele Rocca: > Hey Moritz, > > On 2022-10-26 08:20, Moritz Mühlenhoff wrote: > > I think this should rather be applied early after the Bookworm > > release (and ideally we can also finish off the necessary testing >

Bug#1038951: fdkaac: CVE-2023-34823 CVE-2023-34824

2023-06-23 Thread Moritz Mühlenhoff
Source: fdkaac X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for fdkaac. CVE-2023-34823[0]: | fdkaac before 1.0.5 was discovered to contain a stack overflow in | read_callback function in src/main.c.

Bug#1038949: sabnzbdplus: CVE-2023-34237

2023-06-23 Thread Moritz Mühlenhoff
Source: sabnzbdplus X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for sabnzbdplus. CVE-2023-34237[0]: | SABnzbd is an open source automated Usenet download tool. A design | flaw was discovered in SABnzbd that could allow

Bug#1038950: ruby-doorkeeper: CVE-2023-34246

2023-06-23 Thread Moritz Mühlenhoff
Source: ruby-doorkeeper X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for ruby-doorkeeper. CVE-2023-34246[0]: | Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape. Prior | to version 5.6.6, Doorkeeper

Bug#1038948: flask-appbuilder: CVE-2023-34110

2023-06-23 Thread Moritz Mühlenhoff
Source: flask-appbuilder X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for flask-appbuilder. CVE-2023-34110[0]: | Flask-AppBuilder is an application development framework, built on | top of Flask. Prior to version 4.3.2,

Bug#1038947: netty: CVE-2023-34462

2023-06-23 Thread Moritz Mühlenhoff
Source: netty X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for netty. CVE-2023-34462[0]: | Netty is an asynchronous event-driven network application framework | for rapid development of maintainable high performance

Bug#1038088: raincat: Indirectly depends on SDL 1.2

2023-06-21 Thread Moritz Mühlenhoff
tags fixed-upstream thanks Am Thu, Jun 15, 2023 at 02:08:04PM +0100 schrieb Simon McVittie: > Source: raincat > Tags: trixie sid > User: pkg-sdl-maintain...@lists.alioth.debian.org > Usertags: libsdl1.2 > > This package depends on libghc-sdl-dev, which is a language binding > for SDL 1.2. SDL

Bug#918914: add -fstack-clash-protection to default buildflags

2023-06-21 Thread Moritz Mühlenhoff
Am Fri, May 27, 2022 at 09:48:05AM +0200 schrieb Guillem Jover: > I don't think the issues presented by Florian were ever resolved, so > my concerns in https://bugs.debian.org/918914#15 would still apply, > even though Ubuntu has enabled this, but they have a different set of > architectures. I

Bug#1034732: fixed in gpac 2.2.1+dfsg1-1

2023-06-20 Thread Moritz Mühlenhoff
Am Tue, Jun 20, 2023 at 06:06:26PM + schrieb Debian FTP Masters: > Source: gpac > Source-Version: 2.2.1+dfsg1-1 > Done: Reinhard Tartler > Changes: > gpac (2.2.1+dfsg1-1) experimental; urgency=medium > . >* New upstream version, > closes: #1033116, #1034732, #1034187, #1036701,

Bug#1038663: jtidy: CVE-2023-34623

2023-06-19 Thread Moritz Mühlenhoff
Source: jtidy X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for jtidy. CVE-2023-34623[0]: | An issue was discovered jtidy thru r938 allows attackers to cause a | denial of service or other unspecified impacts via crafted

Bug#1025011: fixed in netatalk 3.1.15~ds-1

2023-05-24 Thread Moritz Mühlenhoff
1025011, thanks to Moritz Mühlenhoff It's nice that there's renewed interest, but this involves also taking care of netatalk in stable, there's a range of issues (full list at https://security-tracker.debian.org/tracker/source-package/netatalk) which need to be backported to bullseye-security. I'm re

Bug#1036702: qtbase-opensource-src-gles: CVE-2023-32762

2023-05-24 Thread Moritz Mühlenhoff
Am Wed, May 24, 2023 at 03:50:06PM +0200 schrieb Moritz Mühlenhoff: > Source: qtbase-opensource-src-gles > X-Debbugs-CC: t...@security.debian.org > Severity: important > Tags: security > > Hi, > > The following vulnerability was published for qtbase-opensource-src-gle

Bug#1036703: teeworlds: CVE-2023-31517 CVE-2023-31518

2023-05-24 Thread Moritz Mühlenhoff
Source: teeworlds X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerabilities were published for teeworlds. CVE-2023-31517[0]: | Teeworlds v0.7.5 was discovered to contain memory leaks.

Bug#1036702: qtbase-opensource-src-gles: CVE-2023-32762

2023-05-24 Thread Moritz Mühlenhoff
Source: qtbase-opensource-src-gles X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for qtbase-opensource-src-gles. CVE-2023-32762[0]: https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305 Per IRC

Bug#1036701: gpac: CVE-2023-2837 CVE-2023-2838 CVE-2023-2839 CVE-2023-2840

2023-05-24 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2023-2837[0]: | Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to | 2.2.2.

Bug#1036697: asterisk: CVE-2023-27585

2023-05-24 Thread Moritz Mühlenhoff
Source: asterisk X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for asterisk. CVE-2023-27585[0]: | PJSIP is a free and open source multimedia communication library | written in C. A buffer overflow vulnerability in versions

Bug#1036696: bitcoin: CVE-2018-20587

2023-05-24 Thread Moritz Mühlenhoff
Source: bitcoin X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for bitcoin. CVE-2018-20587[0]: | Bitcoin Core 0.12.0 through 0.17.1 and Bitcoin Knots 0.12.0 through | 0.17.x before 0.17.1.knots20181229 have Incorrect

Bug#1036695: civicrm: CVE-2023-25440

2023-05-24 Thread Moritz Mühlenhoff
Source: civicrm X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for civicrm. CVE-2023-25440[0]: | Stored Cross Site Scripting (XSS) vulnerability in the add contact | function CiviCRM 5.59.alpha1, allows attackers to

Bug#1036694: angular.js: CVE-2022-25869 CVE-2023-26116 CVE-2023-26117 CVE-2023-26118

2023-05-24 Thread Moritz Mühlenhoff
Source: angular.js X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for angular.js. CVE-2022-25869[0]: | All versions of package angular are vulnerable to Cross-site Scripting | (XSS) due to insecure page caching in the

Bug#1014779: angular.js: CVE-2022-25844

2023-05-24 Thread Moritz Mühlenhoff
Am Tue, Jul 12, 2022 at 04:44:36PM +0200 schrieb László Böszörményi (GCS): > Hi Moritz, > > On Mon, Jul 11, 2022 at 9:27 PM Moritz Mühlenhoff wrote: > > The following vulnerability was published for angular.js. > > > > CVE-2022-25844[0]: > I don't think

Bug#1036284: civicrm: CVE-2023-28115

2023-05-18 Thread Moritz Mühlenhoff
Source: civicrm X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for snappy, which is bundled by civicrm: CVE-2023-28115[0]: | Snappy is a PHP library allowing thumbnail, snapshot or PDF generation | from a url or a html

Bug#1036283: jruby: CVE-2023-28755 CVE-2023-28756

2023-05-18 Thread Moritz Mühlenhoff
Source: jruby X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerabilities were published for jruby. CVE-2023-28755[0]: | A ReDoS issue was discovered in the URI component through 0.12.0 in | Ruby through 3.2.1. The URI parser mishandles invalid URLs

Bug#1036282: tiff: CVE-2023-2731

2023-05-18 Thread Moritz Mühlenhoff
Source: tiff X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for tiff. CVE-2023-2731[0]: | A NULL pointer dereference flaw was found in Libtiff's LZWDecode() | function in the libtiff/tif_lzw.c file. This flaw allows a

Bug#1036281: libraw: CVE-2023-1729

2023-05-18 Thread Moritz Mühlenhoff
Source: libraw X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for libraw. CVE-2023-1729[0]: | A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() | caused by a maliciously crafted file may lead to an

Bug#1036280: openjdk-11: CVE-2023-21930 CVE-2023-21937 CVE-2023-21938 CVE-2023-21939 CVE-2023-21954 CVE-2023-21967 CVE-2023-21968

2023-05-18 Thread Moritz Mühlenhoff
Source: openjdk-11 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for openjdk-11. CVE-2023-21930[0]: | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition | product of Oracle Java SE (component: JSSE).

Bug#1036278: libpodofo: CVE-2023-31566 CVE-2023-31567

2023-05-18 Thread Moritz Mühlenhoff
Source: libpodofo X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for libpodofo. CVE-2023-31566[0]: | Podofo v0.10.0 was discovered to contain a heap-use-after-free via the | component

Bug#1035957: openjdk-17: CVE-2023-21930 CVE-2023-21937 CVE-2023-21938 CVE-2023-21939 CVE-2023-21954 CVE-2023-21967 CVE-2023-21968

2023-05-11 Thread Moritz Mühlenhoff
Source: openjdk-17 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for openjdk-17. CVE-2023-21930[0]: | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition | product of Oracle Java SE (component: JSSE).

Bug#1035956: docker-registry: CVE-2023-2253

2023-05-11 Thread Moritz Mühlenhoff
Source: docker-registry X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for docker-registry. CVE-2023-2253[0]: https://www.openwall.com/lists/oss-security/2023/05/09/1

Bug#1035955: vim: CVE-2023-2610

2023-05-11 Thread Moritz Mühlenhoff
Source: vim X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for vim. CVE-2023-2610[0]: | Integer Overflow or Wraparound in GitHub repository vim/vim prior to | 9.0.1532.

Bug#1035954: opencv: CVE-2023-2617 CVE-2023-2618

2023-05-11 Thread Moritz Mühlenhoff
Source: opencv X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerabilities were published for opencv. CVE-2023-2617[0]: | A vulnerability classified as problematic was found in OpenCV | wechat_qrcode Module up to 4.7.0. Affected by this vulnerability

Bug#1035951: yasm: CVE-2023-29579

2023-05-11 Thread Moritz Mühlenhoff
Source: yasm X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for yasm. CVE-2023-29579[0]: | yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via | the component yasm/yasm+0x43b466 in vsprintf.

Bug#1035953: odoo: CVE-2021-23166 CVE-2021-23176 CVE-2021-23178 CVE-2021-23186 CVE-2021-23203 CVE-2021-26263 CVE-2021-26947 CVE-2021-44476 CVE-2021-44775 CVE-2021-45071 CVE-2021-45111

2023-05-11 Thread Moritz Mühlenhoff
Source: odoo X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for odoo. CVE-2021-23166[0]: | A sandboxing issue in Odoo Community 15.0 and earlier and Odoo | Enterprise 15.0 and earlier allows authenticated administrators

Bug#1035952: apache-jena: CVE-2023-22665

2023-05-11 Thread Moritz Mühlenhoff
Source: apache-jena X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for apache-jena. CVE-2023-22665[0]: | There is insufficient checking of user queries in Apache Jena versions | 4.7.0 and earlier, when invoking custom

Bug#1035950: dav1d: CVE-2023-32570

2023-05-11 Thread Moritz Mühlenhoff
Source: dav1d X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for dav1d. CVE-2023-32570[0]: | VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that | can lead to an application crash, related to

Bug#1035936: maradns: CVE-2023-31137

2023-05-11 Thread Moritz Mühlenhoff
Source: maradns X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for maradns. CVE-2023-31137[0]: | MaraDNS is open-source software that implements the Domain Name System | (DNS). In version 3.5.0024 and prior, a remotely

Bug#1035935: libpodofo: CVE-2023-31555 CVE-2023-31556 CVE-2023-31568

2023-05-11 Thread Moritz Mühlenhoff
Source: libpodofo X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for libpodofo. CVE-2023-31555[0]: | podofoinfo 0.10.0 was discovered to contain a segmentation violation | via the function

Bug#1035934: in-toto: CVE-2023-32076

2023-05-11 Thread Moritz Mühlenhoff
Source: in-toto X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for in-toto. CVE-2023-32076[0]: | in-toto is a framework to protect supply chain integrity. The in-toto | configuration is read from various directories and

Bug#1035854: Bookworm netboot image fails in VM

2023-05-10 Thread Moritz Mühlenhoff
Moritz Muehlenhoff wrote: > call. $MENU is set to '/usr/bin/main-menu' and in fact running > > "debconf -o d-i /usr/bin/main-menu" tries to emit some output (I can see the > cursor > moving), but drops back to the shell right away. > > I'm not familiar with cdebconf, if there's some suggested

Bug#1035829: frr: CVE-2022-43681 CVE-2022-40318 CVE-2022-40302

2023-05-09 Thread Moritz Mühlenhoff
Source: frr X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for frr. CVE-2022-43681[0]: | An out-of-bounds read exists in the BGP daemon of FRRouting FRR | through 8.4. When sending a malformed BGP OPEN message that ends

Bug#1035541: puppetserver: CVE-2023-1894

2023-05-05 Thread Moritz Mühlenhoff
Source: puppetserver X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for puppetserver. CVE-2023-1894[0]: | A Regular Expression Denial of Service (ReDoS) issue was discovered in | Puppet Server 7.9.2 certificate validation.

Bug#1033916: libapache2-mod-auth-openidc: CVE-2023-28625: segfault DoS when OIDCStripCookies is set

2023-05-03 Thread Moritz Mühlenhoff
Am Tue, May 02, 2023 at 01:05:55PM +0200 schrieb Moritz Schlarb: > Dear Security Team, > > regarding fixing this in Bullseye > (https://salsa.debian.org/debian/libapache2-mod-auth-openidc/-/compare/769c3920203e7c64f6ff9456ee6858ac0cb034f0...a8e821213ac28ca0909ca4f1bf512de5e35f90fa): > > Shall I

Bug#1034891: 389-ds-base: CVE-2023-1055

2023-04-26 Thread Moritz Mühlenhoff
Source: 389-ds-base X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for 389-ds-base. CVE-2023-1055[0]: | A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP | tries to decode the userPassword attribute

Bug#1034890: gpac: CVE-2023-0841

2023-04-26 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerability was published for gpac. CVE-2023-0841[0]: | A vulnerability, which was classified as critical, has been found in | GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function |

Bug#1034888: ruby-commonmarker: CVE-2022-39209

2023-04-26 Thread Moritz Mühlenhoff
Source: ruby-commonmarker X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for ruby-commonmarker. CVE-2022-39209[0]: | cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and | rendering library and program in C. In

Bug#1034889: mariadb: CVE-2022-47015

2023-04-26 Thread Moritz Mühlenhoff
Source: mariadb X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerability was published for mariadb. CVE-2022-47015[0]: | MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of | Service. It is possible for function

Bug#1034887: python-cmarkgfm: CVE-2022-39209

2023-04-26 Thread Moritz Mühlenhoff
Source: python-cmarkgfm X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for python-cmarkgfm. CVE-2022-39209[0]: | cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and | rendering library and program in C. In

Bug#1034886: docker.io: CVE-2022-37708

2023-04-26 Thread Moritz Mühlenhoff
Source: docker.io X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for docker.io. CVE-2022-37708[0]: | Docker version 20.10.15, build fd82621 is vulnerable to Insecure | Permissions. Unauthorized users outside the Docker

Bug#1034848: slic3r: CVE-2022-36788

2023-04-25 Thread Moritz Mühlenhoff
Source: slic3r X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for slic3r. CVE-2022-36788[0]: | A heap-based buffer overflow vulnerability exists in the TriangleMesh | clone functionality of Slic3r libslic3r 1.3.0 and Master

Bug#1034847: lua5.3: CVE-2021-43519

2023-04-25 Thread Moritz Mühlenhoff
Source: lua5.3 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for lua5.3. CVE-2021-43519[0]: | Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 | allows attackers to perform a Denial of Service via a

Bug#1034845: lua5.1: CVE-2021-43519

2023-04-25 Thread Moritz Mühlenhoff
Source: lua5.1 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for lua5.1. CVE-2021-43519[0]: | Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 | allows attackers to perform a Denial of Service via a

Bug#1034846: lua5.2: CVE-2021-43519

2023-04-25 Thread Moritz Mühlenhoff
Source: lua5.2 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for lua5.2. CVE-2021-43519[0]: | Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 | allows attackers to perform a Denial of Service via a

Bug#1034844: vtk7: CVE-2021-42521

2023-04-25 Thread Moritz Mühlenhoff
Source: vtk7 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for vtk7. CVE-2021-42521[0]: | There is a NULL pointer dereference vulnerability in VTK before 9.2.5, | and it lies in IO/Infovis/vtkXMLTreeReader.cxx. The vendor

Bug#1034843: vtk6: CVE-2021-42521

2023-04-25 Thread Moritz Mühlenhoff
Source: vtk6 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for vtk6. CVE-2021-42521[0]: | There is a NULL pointer dereference vulnerability in VTK before 9.2.5, | and it lies in IO/Infovis/vtkXMLTreeReader.cxx. The vendor

Bug#1034841: consul: CVE-2021-41803

2023-04-25 Thread Moritz Mühlenhoff
Source: consul X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for consul. CVE-2021-41803[0]: | HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not | properly validate the node or segment names prior to interpolation

Bug#1034840: etcd: CVE-2021-28235

2023-04-25 Thread Moritz Mühlenhoff
Source: etcd X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for etcd. CVE-2021-28235[0]: | Authentication vulnerability found in Etcd-io v.3.4.10 allows remote | attackers to escalate privileges via the debug function.

Bug#1034838: hdf5: CVE-2019-8396 CVE-2019-8398

2023-04-25 Thread Moritz Mühlenhoff
Source: hdf5 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for hdf5. CVE-2019-8396[0]: | A buffer overflow in H5O__layout_encode in H5Olayout.c in the HDF HDF5 | through 1.10.4 library allows attackers to cause a

Bug#1034807: hdf5: CVE-2018-11205

2023-04-24 Thread Moritz Mühlenhoff
Source: hdf5 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for hdf5. CVE-2018-11205[0]: | A out of bounds read was discovered in H5VM_memcpyvv in H5VM.c in the | HDF HDF5 1.10.2 library. It could allow a remote denial of

Bug#1034806: dogecoin: CVE-2021-37491 CVE-2023-30769

2023-04-24 Thread Moritz Mühlenhoff
Source: dogecoin X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for dogecoin. CVE-2021-37491[0]: | An issue discovered in src/wallet/wallet.cpp in Dogecoin Project | Dogecoin Core 1.14.3 and earlier allows attackers to view

Bug#1034805: fis-gtm: CVE-2021-44496 CVE-2021-44504

2023-04-24 Thread Moritz Mühlenhoff
Source: fis-gtm X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerabilities were published for fis-gtm. CVE-2021-44496[0]: | An issue was discovered in FIS GT.M through V7.0-000 (related to the | YottaDB code base). Using crafted input, an attacker

Bug#1034803: samba: CVE-2018-14628

2023-04-24 Thread Moritz Mühlenhoff
Source: samba X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for samba. CVE-2018-14628[0]: | An information leak vulnerability was discovered in Samba's LDAP | server. Due to missing access control checks, an authenticated

Bug#1034804: resteasy: CVE-2020-1695

2023-04-24 Thread Moritz Mühlenhoff
Source: resteasy X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for resteasy. CVE-2020-1695[0]: | A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final | and all resteasy 4.x.x versions prior to

Bug#1034802: dogtag-pki: CVE-2022-2393

2023-04-24 Thread Moritz Mühlenhoff
Source: dogtag-pki X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for dogtag-pki. CVE-2022-2393[0]: | A flaw was found in pki-core, which could allow a user to get a | certificate for another user identity when

Bug#1034799: nvidia-cuda-toolkit: CVE-2023-25510 CVE-2023-25511 CVE-2023-25512 CVE-2023-25513 CVE-2023-25514

2023-04-24 Thread Moritz Mühlenhoff
Source: nvidia-cuda-toolkit X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for nvidia-cuda-toolkit. CVE-2023-25510[0]: | NVIDIA CUDA Toolkit SDK for Linux and Windows contains a NULL pointer | dereference in cuobjdump,

Bug#1034725: pev: CVE-2021-45423

2023-04-22 Thread Moritz Mühlenhoff
Source: pev X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for pev. CVE-2021-45423[0]: | A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports | function from exports.c.. The array offsets_to_Names is

Bug#1034724: libyang2: CVE-2023-26917

2023-04-22 Thread Moritz Mühlenhoff
Source: libyang2 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for libyang2. CVE-2023-26917[0]: | libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL | pointer dereference via the function

Bug#1034723: rust-hyper: CVE-2023-26964

2023-04-22 Thread Moritz Mühlenhoff
Source: rust-hyper X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for rust-hyper. CVE-2023-26964[0]: | An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking | occurs when the H2 component processes HTTP2

Bug#1034722: jpeg-xl: CVE-2023-0645

2023-04-22 Thread Moritz Mühlenhoff
Source: jpeg-xl X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for jpeg-xl. CVE-2023-0645[0]: | An out of bounds read exists in libjxl. An attacker using a | specifically crafted file could cause an out of bounds read in

Bug#1034721: wireshark: CVE-2023-1992 CVE-2023-1993 CVE-2023-1994

2023-04-22 Thread Moritz Mühlenhoff
Source: wireshark X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for wireshark. CVE-2023-1992[0]: | RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to | 3.6.12 allows denial of service via packet

Bug#1034720: openssl: CVE-2023-1255 CVE-2023-0466 CVE-2023-0465 CVE-2023-0464

2023-04-22 Thread Moritz Mühlenhoff
Source: openssl X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for openssl. CVE-2023-1255[0]: | Issue summary: The AES-XTS cipher decryption implementation for 64 bit | ARM platform contains a bug that could cause it to

Bug#1034719: mysql-8.0: CVE-2023-21982 CVE-2023-21980 CVE-2023-21977 CVE-2023-21976 CVE-2023-21972 CVE-2023-21966 CVE-2023-21962 CVE-2023-21955 CVE-2023-21953 CVE-2023-21947 CVE-2023-21946 CVE-2023-21

2023-04-22 Thread Moritz Mühlenhoff
Source: mysql-8.0 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for mysql-8.0. CVE-2023-21982[0]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Optimizer). Supported versions that are

Bug#1034373: imagemagick: CVE-2023-1906

2023-04-13 Thread Moritz Mühlenhoff
Source: imagemagick X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for imagemagick. CVE-2023-1906[0]: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-35q2-86c7-9247

Bug#1034372: ncurses: CVE-2023-29491

2023-04-13 Thread Moritz Mühlenhoff
Source: ncurses X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for ncurses. CVE-2023-29491 was assigned to https://invisible-island.net/ncurses/NEWS.html#index-t20230408 If you fix the vulnerability please also make sure

Bug#1034187: gpac: CVE-2023-0841 CVE-2023-1448 CVE-2023-1449 CVE-2023-1452 CVE-2023-1654 CVE-2023-1655

2023-04-10 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2023-1448[1]: | A vulnerability, which was classified as problematic, was found in | GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the

Bug#1034185: opendoas: CVE-2023-28339

2023-04-10 Thread Moritz Mühlenhoff
Source: opendoas X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for opendoas. CVE-2023-28339[0]: | OpenDoas through 6.8.2, when TIOCSTI is available, allows privilege | escalation because of sharing a terminal with the

Bug#1034186: heat: CVE-2023-1625

2023-04-10 Thread Moritz Mühlenhoff
Source: heat X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for heat. CVE-2023-1625[0]: information leak in API https://bugzilla.redhat.com/show_bug.cgi?id=2181621 https://review.opendev.org/c/openstack/heat/+/868166

Bug#1034184: nextcloud-desktop: CVE-2023-28999

2023-04-10 Thread Moritz Mühlenhoff
Source: nextcloud-desktop X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for nextcloud-desktop. CVE-2023-28999[0]: | Nextcloud is an open-source productivity platform. In Nextcloud | Desktop client 3.0.0 until 3.8.0,

Bug#1034183: stellarium: CVE-2023-28371

2023-04-10 Thread Moritz Mühlenhoff
Source: stellarium X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for stellarium. CVE-2023-28371[0]: | In Stellarium through 1.2, attackers can write to files that are | typically unintended, such as ones with absolute

Bug#1034182: owslib: CVE-2023-27476

2023-04-10 Thread Moritz Mühlenhoff
Source: owslib X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for owslib. CVE-2023-27476[0]: | OWSLib is a Python package for client programming with Open Geospatial | Consortium (OGC) web service interface standards, and

Bug#1034181: nomad: CVE-2023-0821

2023-04-10 Thread Moritz Mühlenhoff
Source: nomad X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for nomad. CVE-2023-0821[0]: | HashiCorp Nomad and Nomad Enterprise 1.2.15 up to 1.3.8, and 1.4.3 | jobs using a maliciously compressed artifact stanza source

Bug#1034179: qemu: CVE-2023-1544

2023-04-10 Thread Moritz Mühlenhoff
Source: qemu X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for qemu. CVE-2023-1544[0]: | A flaw was found in the QEMU implementation of VMWare's paravirtual | RDMA device. This flaw allows a crafted guest driver to

Bug#1034180: radare2: CVE-2023-1605

2023-04-10 Thread Moritz Mühlenhoff
Source: radare2 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for radare2. CVE-2023-1605[0]: | Denial of Service in GitHub repository radareorg/radare2 prior to | 5.8.6.

Bug#1034178: opensmtpd: CVE-2023-29323

2023-04-10 Thread Moritz Mühlenhoff
Source: opensmtpd X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for opensmtpd. CVE-2023-29323[0]: | ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 | before errata 020, and OpenSMTPD Portable before

Bug#1034177: bzip2: CVE-2023-29415 CVE-2023-29416 CVE-2023-29418 CVE-2023-29419 CVE-2023-29420 CVE-2023-29421

2023-04-10 Thread Moritz Mühlenhoff
Source: bzip2 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for bzip2. CVE-2023-29415[0]: | An issue was discovered in libbzip3.a in bzip3 before 1.3.0. A denial | of service (process hang) can occur with a crafted archive

Bug#1034172: python-cmarkgfm: CVE-2023-26485 CVE-2023-24824

2023-04-10 Thread Moritz Mühlenhoff
Source: python-cmarkgfm X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for python-cmarkgfm. CVE-2023-26485[0]: | cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and | rendering library and program in C. A

Bug#1034174: ruby-commonmarker: CVE-2023-26485 CVE-2023-24824

2023-04-10 Thread Moritz Mühlenhoff
Source: ruby-commonmarker X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for ruby-commonmarker. CVE-2023-26485[0]: | cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and | rendering library and program in C. A

Bug#1034173: r-cran-commonmark: CVE-2023-26485 CVE-2023-24824

2023-04-10 Thread Moritz Mühlenhoff
Source: r-cran-commonmark X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for r-cran-commonmark. CVE-2023-26485[0]: | cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and | rendering library and program in C. A

Bug#1034171: cmark-gfm: CVE-2023-26485 CVE-2023-24824

2023-04-10 Thread Moritz Mühlenhoff
Source: cmark-gfm X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for cmark-gfm. CVE-2023-26485[0]: | cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and | rendering library and program in C. A polynomial time

Bug#1034170: netatalk: CVE-2022-43634

2023-04-10 Thread Moritz Mühlenhoff
Source: netatalk X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for netatalk. CVE-2022-43634[0]: | This vulnerability allows remote attackers to execute arbitrary code | on affected installations of Netatalk. Authentication is

Bug#1033492: unblock: php8.2/8.2.4-1 ????

2023-04-04 Thread Moritz Mühlenhoff
Am Tue, Apr 04, 2023 at 09:14:36PM +0200 schrieb Paul Gevers: > On 04-04-2023 20:07, Moritz Mühlenhoff wrote: > > If we would add the list of source packages which are following micro > releases > > in stable-security to a machine-parseable list (e.g. somewhere in the > &g

Bug#1033492: unblock: php8.2/8.2.4-1 ????

2023-04-04 Thread Moritz Mühlenhoff
Am Tue, Apr 04, 2023 at 08:58:37AM +0200 schrieb Ondřej Surý: > Hi Paul, Salvatore, > > In all honesty, I thought that the pre-negotiated exception for PHP > does apply to all future Debian releases, so it did come as surprise > that I have to explain this again. Question to the release team: If

<    1   2   3   4   5   6   7   8   9   10   >