[Git][security-tracker-team/security-tracker][master] 3 commits: mark CVEs for gpac as EOL in Buster

2023-12-09 Thread Thorsten Alteholz (@alteholz)


Thorsten Alteholz pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
dff9ed60 by Thorsten Alteholz at 2023-12-10T00:25:45+01:00
mark CVEs for gpac as EOL in Buster

- - - - -
52c1cae8 by Thorsten Alteholz at 2023-12-10T00:27:32+01:00
mark CVE-2023-49284 as no-dsa for Buster

- - - - -
917a5171 by Thorsten Alteholz at 2023-12-10T00:38:00+01:00
mark CVE-2023-49464 CVE-2023-49463 CVE-2023-49462 CVE-2023-49460 as 
not-affected for Buster

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -24,6 +24,7 @@ CVE-2023-47722 (IBM API Connect V10.0.5.3 and V10.0.6.0 
stores user credentials
NOT-FOR-US: IBM
 CVE-2023-47465 (An issue in GPAC v.2.2.1 and before allows a local attacker to 
cause a ...)
- gpac 
+   [buster] - gpac  (EOL in Buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2652
NOTE: 
https://github.com/gpac/gpac/commit/a40a3b7ef7420c8df0a7d9411ab1fc267ca86c49
NOTE: 
https://github.com/gpac/gpac/commit/613dbc5702b09063b101cfc3d6ad74b45ad87521
@@ -31,6 +32,7 @@ CVE-2023-47254 (An OS Command Injection in the CLI interface 
on DrayTek Vigor167
NOT-FOR-US: DrayTek Vigor167
 CVE-2023-46932 (Heap Buffer Overflow vulnerability in GPAC version 
2.3-DEV-rev617-g671 ...)
- gpac 
+   [buster] - gpac  (EOL in Buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2669
NOTE: 
https://github.com/gpac/gpac/commit/dfdf1681aae2f7b6265e58e97f8461a89825a74b
 CVE-2023-6622 (A null pointer dereference vulnerability was found in 
nft_dynset_init( ...)
@@ -269,6 +271,7 @@ CVE-2023-49464 (libheif v1.17.5 was discovered to contain a 
segmentation violati
- libheif 
[bookworm] - libheif  (Minor issue)
[bullseye] - libheif  (Minor issue)
+   [buster] - libheif  (Vulnerable code not present)
NOTE: https://github.com/strukturag/libheif/issues/1044
NOTE: https://github.com/strukturag/libheif/pull/1049
NOTE: 
https://github.com/strukturag/libheif/commit/2bf226a300951e6897ee7267d0dd379ba5ad7287
@@ -276,16 +279,19 @@ CVE-2023-49463 (libheif v1.17.5 was discovered to contain 
a segmentation violati
- libheif 
[bookworm] - libheif  (Minor issue)
[bullseye] - libheif  (Minor issue)
+   [buster] - libheif  (Vulnerable code not present)
NOTE: https://github.com/strukturag/libheif/issues/1042
 CVE-2023-49462 (libheif v1.17.5 was discovered to contain a segmentation 
violation via ...)
- libheif 
[bookworm] - libheif  (Minor issue)
[bullseye] - libheif  (Minor issue)
+   [buster] - libheif  (Vulnerable code not present)
NOTE: https://github.com/strukturag/libheif/issues/1043
 CVE-2023-49460 (libheif v1.17.5 was discovered to contain a segmentation 
violation via ...)
- libheif 
[bookworm] - libheif  (Minor issue)
[bullseye] - libheif  (Minor issue)
+   [buster] - libheif  (Vulnerable code not present)
NOTE: https://github.com/strukturag/libheif/issues/1046
 CVE-2023-49437 (Tenda AX12 V22.03.01.46 has been discovered to contain a 
command injec ...)
NOT-FOR-US: Tenda
@@ -798,6 +804,7 @@ CVE-2023-49284 (fish is a smart and user-friendly command 
line shell for macOS,
- fish  (bug #1057455)
[bookworm] - fish  (Minor issue)
[bullseye] - fish  (Minor issue)
+   [buster] - fish  (Minor issue)
NOTE: 
https://github.com/fish-shell/fish-shell/security/advisories/GHSA-2j9r-pm96-wp4f
NOTE: 
https://github.com/fish-shell/fish-shell/commit/09986f5563e31e2c900a606438f1d60d008f3a14
 (3.6.2)
 CVE-2023-49280 (XWiki Change Request is an XWiki application allowing to 
request chang ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/68e140b27ee90086aed7c0a2f35d998587eb27b0...917a51719f847fc8d75dfdd0a210f43d636af528

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/68e140b27ee90086aed7c0a2f35d998587eb27b0...917a51719f847fc8d75dfdd0a210f43d636af528
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Process one NFU

2023-12-09 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
68e140b2 by Salvatore Bonaccorso at 2023-12-10T00:06:16+01:00
Process one NFU

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,7 +1,7 @@
 CVE-2023-50428 (In Bitcoin Core through 26.0 and Bitcoin Knots before 
25.1.knots202311 ...)
TODO: check
 CVE-2021-46899 (SyncTrayzor 1.1.29 enables CEF (Chromium Embedded Framework) 
remote de ...)
-   TODO: check
+   NOT-FOR-US: SyncTrayzor
 CVE-2023-6394 (A flaw was found in Quarkus. This issue occurs when receiving a 
reques ...)
NOT-FOR-US: Quarkus
 CVE-2023-6337 (HashiCorp Vault and Vault Enterprise 1.12.0 and newer are 
vulnerable t ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/68e140b27ee90086aed7c0a2f35d998587eb27b0

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/68e140b27ee90086aed7c0a2f35d998587eb27b0
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Update status for jruby issues

2023-12-09 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8f6beaf6 by Salvatore Bonaccorso at 2023-12-10T00:03:13+01:00
Update status for jruby issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -24742,9 +24742,7 @@ CVE-2023-36617 (A ReDoS issue was discovered in the URI 
component before 0.12.2
- ruby2.7  (Incomplete fix never applied)
- ruby2.5 
[buster] - ruby2.5  (Minor issue, ReDoS)
-   - jruby 
-   [bookworm] - jruby  (Incomplete fix never applied)
-   [bullseye] - jruby  (Incomplete fix never applied)
+   - jruby  (Incomplete fix not applied, covered by 
CVE-2023-28755)
[buster] - jruby  (Minor issue, ReDoS)
NOTE: 
https://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/
NOTE: 
https://github.com/ruby/uri/commit/9010ee2536adda10a0555ae1ed6fe2f5808e6bf1
@@ -38374,6 +38372,7 @@ CVE-2023-28756 (A ReDoS issue was discovered in the 
Time component through 0.2.1
- ruby3.1  (bug #1038408)
- ruby2.7 
- ruby2.5 
+   [experimental] - jruby 9.4.3.0+ds-1~exp1
- jruby  (bug #1036283)
[bookworm] - jruby  (Minor issue)
NOTE: Fixed by: 
https://github.com/ruby/ruby/commit/957bb7cb81995f26c671afce0ee50a5c660e540e 
(v3_1_4)
@@ -38388,6 +38387,7 @@ CVE-2023-28755 (A ReDoS issue was discovered in the URI 
component through 0.12.0
- ruby3.1  (bug #1038408)
- ruby2.7 
- ruby2.5 
+   [experimental] - jruby 9.4.3.0+ds-1~exp1
- jruby  (bug #1036283)
[bookworm] - jruby  (Minor issue)
NOTE: Fixed by: 
https://github.com/ruby/ruby/commit/8ce4ab146498879b65e22f1be951b25eebb79300 
(v3_1_4)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8f6beaf6fea0e5227e71f169df045f83f77e5bf1

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8f6beaf6fea0e5227e71f169df045f83f77e5bf1
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] automatic update

2023-12-09 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
598f4435 by security tracker role at 2023-12-09T20:12:36+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,3 +1,7 @@
+CVE-2023-50428 (In Bitcoin Core through 26.0 and Bitcoin Knots before 
25.1.knots202311 ...)
+   TODO: check
+CVE-2021-46899 (SyncTrayzor 1.1.29 enables CEF (Chromium Embedded Framework) 
remote de ...)
+   TODO: check
 CVE-2023-6394 (A flaw was found in Quarkus. This issue occurs when receiving a 
reques ...)
NOT-FOR-US: Quarkus
 CVE-2023-6337 (HashiCorp Vault and Vault Enterprise 1.12.0 and newer are 
vulnerable t ...)
@@ -23558,7 +23562,7 @@ CVE-2023-36925 (SAP Solution Manager (Diagnostics 
agent) - version 7.20, allows
NOT-FOR-US: SAP
 CVE-2023-36924 (While using a specific function, SAP ERP Defense Forces and 
Public Sec ...)
NOT-FOR-US: SAP
-CVE-2023-36922 (Due to programming error in function module or report, SAP 
NetWeaver A ...)
+CVE-2023-36922 (Due to programming error in function module and report, IS-OIL 
compone ...)
NOT-FOR-US: SAP
 CVE-2023-36921 (SAP Solution Manager (Diagnostics agent) - version 7.20, 
allows an att ...)
NOT-FOR-US: SAP



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/598f44359de95ae22798e29cb6d693f14143e325

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/598f44359de95ae22798e29cb6d693f14143e325
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Process two NFUs

2023-12-09 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d461a7ac by Salvatore Bonaccorso at 2023-12-09T11:35:42+01:00
Process two NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -13,9 +13,9 @@ CVE-2023-49799 (`nuxt-api-party` is an open source module to 
proxy API requests.
 CVE-2023-49798 (OpenZeppelin Contracts is a library for smart contract 
development. A  ...)
NOT-FOR-US: OpenZeppelin Contracts
 CVE-2023-49797 (PyInstaller bundles a Python application and all its 
dependencies into ...)
-   TODO: check
+   NOT-FOR-US: PyInstaller
 CVE-2023-48311 (dockerspawner is a tool to spawn JupyterHub single user 
servers in Doc ...)
-   TODO: check
+   NOT-FOR-US: dockerspawner
 CVE-2023-47722 (IBM API Connect V10.0.5.3 and V10.0.6.0 stores user 
credentials in bro ...)
NOT-FOR-US: IBM
 CVE-2023-47465 (An issue in GPAC v.2.2.1 and before allows a local attacker to 
cause a ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d461a7ac625442d51d04f15c1ec314befc5a9f9e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d461a7ac625442d51d04f15c1ec314befc5a9f9e
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Process some NFUs

2023-12-09 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9ef175f7 by Salvatore Bonaccorso at 2023-12-09T09:53:25+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,30 +1,30 @@
 CVE-2023-6394 (A flaw was found in Quarkus. This issue occurs when receiving a 
reques ...)
-   TODO: check
+   NOT-FOR-US: Quarkus
 CVE-2023-6337 (HashiCorp Vault and Vault Enterprise 1.12.0 and newer are 
vulnerable t ...)
-   TODO: check
+   NOT-FOR-US: HashiCorp Vault
 CVE-2023-6120 (The Welcart e-Commerce plugin for WordPress is vulnerable to 
Directory ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2023-5756 (The Digital Publications by Supsystic plugin for WordPress is 
vulnerab ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2023-49800 (`nuxt-api-party` is an open source module to proxy API 
requests. The l ...)
-   TODO: check
+   NOT-FOR-US: nuxt-api-party
 CVE-2023-49799 (`nuxt-api-party` is an open source module to proxy API 
requests. nuxt- ...)
-   TODO: check
+   NOT-FOR-US: nuxt-api-party
 CVE-2023-49798 (OpenZeppelin Contracts is a library for smart contract 
development. A  ...)
-   TODO: check
+   NOT-FOR-US: OpenZeppelin Contracts
 CVE-2023-49797 (PyInstaller bundles a Python application and all its 
dependencies into ...)
TODO: check
 CVE-2023-48311 (dockerspawner is a tool to spawn JupyterHub single user 
servers in Doc ...)
TODO: check
 CVE-2023-47722 (IBM API Connect V10.0.5.3 and V10.0.6.0 stores user 
credentials in bro ...)
-   TODO: check
+   NOT-FOR-US: IBM
 CVE-2023-47465 (An issue in GPAC v.2.2.1 and before allows a local attacker to 
cause a ...)
- gpac 
NOTE: https://github.com/gpac/gpac/issues/2652
NOTE: 
https://github.com/gpac/gpac/commit/a40a3b7ef7420c8df0a7d9411ab1fc267ca86c49
NOTE: 
https://github.com/gpac/gpac/commit/613dbc5702b09063b101cfc3d6ad74b45ad87521
 CVE-2023-47254 (An OS Command Injection in the CLI interface on DrayTek 
Vigor167 versi ...)
-   TODO: check
+   NOT-FOR-US: DrayTek Vigor167
 CVE-2023-46932 (Heap Buffer Overflow vulnerability in GPAC version 
2.3-DEV-rev617-g671 ...)
- gpac 
NOTE: https://github.com/gpac/gpac/issues/2669
@@ -37937,13 +37937,13 @@ CVE-2023-28873 (An XSS issue in wiki and discussion 
pages in Seafile 9.0.6 allow
 CVE-2023-28872
RESERVED
 CVE-2023-28871 (Support Assistant in NCP Secure Enterprise Client before 12.22 
allows  ...)
-   TODO: check
+   NOT-FOR-US: Support Assistant in NCP Secure Enterprise Client
 CVE-2023-28870 (Insecure File Permissions in Support Assistant in NCP Secure 
Enterpris ...)
-   TODO: check
+   NOT-FOR-US: Support Assistant in NCP Secure Enterprise Client
 CVE-2023-28869 (Support Assistant in NCP Secure Enterprise Client before 12.22 
allows  ...)
-   TODO: check
+   NOT-FOR-US: Support Assistant in NCP Secure Enterprise Client
 CVE-2023-28868 (Support Assistant in NCP Secure Enterprise Client before 12.22 
allows  ...)
-   TODO: check
+   NOT-FOR-US: Support Assistant in NCP Secure Enterprise Client
 CVE-2023-28867 (In GraphQL Java (aka graphql-java) before 20.1, an attacker 
can send a ...)
NOT-FOR-US: graphql-java
 CVE-2023-28866 (In the Linux kernel through 6.2.8, net/bluetooth/hci_sync.c 
allows out ...)
@@ -39168,15 +39168,15 @@ CVE-2023-28529 (IBM InfoSphere Information Server 
11.7 is vulnerable to stored c
 CVE-2023-28528 (IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a 
non-privileged local ...)
NOT-FOR-US: IBM
 CVE-2023-28527 (IBM Informix Dynamic Server 12.10 and 14.10 cdr is vulnerable 
to a hea ...)
-   TODO: check
+   NOT-FOR-US: IBM
 CVE-2023-28526 (IBM Informix Dynamic Server 12.10 and 14.10 archecker is 
vulnerable to ...)
-   TODO: check
+   NOT-FOR-US: IBM
 CVE-2023-28525
RESERVED
 CVE-2023-28524
RESERVED
 CVE-2023-28523 (IBM Informix Dynamic Server 12.10 and 14.10 onsmsync is 
vulnerable to  ...)
-   TODO: check
+   NOT-FOR-US: IBM
 CVE-2023-28522 (IBM API Connect V10 could allow an authenticated user to 
perform actio ...)
NOT-FOR-US: IBM
 CVE-2023-28521
@@ -228837,7 +228837,7 @@ CVE-2020-25837 (Sensitive information disclosure 
vulnerability in Micro Focus Se
 CVE-2020-25836
RESERVED
 CVE-2020-25835 (A potential vulnerability has been identified in Micro Focus 
ArcSight  ...)
-   TODO: check
+   NOT-FOR-US: Micro Focus ArcSight Management Center
 CVE-2020-25834 (Cross-Site Scripting vulnerability on Micro Focus ArcSight 
Logger prod ...)
NOT-FOR-US: Micro Focus
 CVE-2020-25833 (Persistent cross-Site Scripting vulnerability on Micro Focus 
IDOL prod ...)



View it on GitLab: 

[Git][security-tracker-team/security-tracker][master] Add two issues in seafile (server part, seafile-server, itp'ed)

2023-12-09 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
4bf5d37e by Salvatore Bonaccorso at 2023-12-09T09:51:09+01:00
Add two issues in seafile (server part, seafile-server, itped)

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -37931,9 +37931,9 @@ CVE-2023-28876 (A Broken Access Control issue in 
comments to uploaded files in F
 CVE-2023-28875 (A Stored XSS issue in shared files download terms in Filerun 
Update 20 ...)
NOT-FOR-US: Filerun
 CVE-2023-28874 (The next parameter in the /accounts/login endpoint of Seafile 
9.0.6 al ...)
-   TODO: check
+   - seafile-server  (bug #865830)
 CVE-2023-28873 (An XSS issue in wiki and discussion pages in Seafile 9.0.6 
allows atta ...)
-   TODO: check
+   - seafile-server  (bug #865830)
 CVE-2023-28872
RESERVED
 CVE-2023-28871 (Support Assistant in NCP Secure Enterprise Client before 12.22 
allows  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4bf5d37e1efce5750ec469d6c8b126d4fa4325f5

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4bf5d37e1efce5750ec469d6c8b126d4fa4325f5
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2023-46932/gpac

2023-12-09 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0e0475f3 by Salvatore Bonaccorso at 2023-12-09T09:50:31+01:00
Add CVE-2023-46932/gpac

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -26,7 +26,9 @@ CVE-2023-47465 (An issue in GPAC v.2.2.1 and before allows a 
local attacker to c
 CVE-2023-47254 (An OS Command Injection in the CLI interface on DrayTek 
Vigor167 versi ...)
TODO: check
 CVE-2023-46932 (Heap Buffer Overflow vulnerability in GPAC version 
2.3-DEV-rev617-g671 ...)
-   TODO: check
+   - gpac 
+   NOTE: https://github.com/gpac/gpac/issues/2669
+   NOTE: 
https://github.com/gpac/gpac/commit/dfdf1681aae2f7b6265e58e97f8461a89825a74b
 CVE-2023-6622 (A null pointer dereference vulnerability was found in 
nft_dynset_init( ...)
- linux 
[bullseye] - linux  (Vulnerable code not present)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e0475f3e0639e725f9a435f00ab60639dc5de12

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e0475f3e0639e725f9a435f00ab60639dc5de12
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2023-47465/gpac

2023-12-09 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
778e3806 by Salvatore Bonaccorso at 2023-12-09T09:49:27+01:00
Add CVE-2023-47465/gpac

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -19,7 +19,10 @@ CVE-2023-48311 (dockerspawner is a tool to spawn JupyterHub 
single user servers
 CVE-2023-47722 (IBM API Connect V10.0.5.3 and V10.0.6.0 stores user 
credentials in bro ...)
TODO: check
 CVE-2023-47465 (An issue in GPAC v.2.2.1 and before allows a local attacker to 
cause a ...)
-   TODO: check
+   - gpac 
+   NOTE: https://github.com/gpac/gpac/issues/2652
+   NOTE: 
https://github.com/gpac/gpac/commit/a40a3b7ef7420c8df0a7d9411ab1fc267ca86c49
+   NOTE: 
https://github.com/gpac/gpac/commit/613dbc5702b09063b101cfc3d6ad74b45ad87521
 CVE-2023-47254 (An OS Command Injection in the CLI interface on DrayTek 
Vigor167 versi ...)
TODO: check
 CVE-2023-46932 (Heap Buffer Overflow vulnerability in GPAC version 
2.3-DEV-rev617-g671 ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/778e38060265b077b43791f3f0889c634ca7d92d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/778e38060265b077b43791f3f0889c634ca7d92d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2023-6507/python

2023-12-09 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
abac4ea9 by Salvatore Bonaccorso at 2023-12-09T09:39:36+01:00
Add CVE-2023-6507/python

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -58,7 +58,15 @@ CVE-2023-6607 (A vulnerability has been found in Tongda OA 
2017 up to 11.10 and
 CVE-2023-6606 (An out-of-bounds read vulnerability was found in smbCalcSize in 
fs/smb ...)
- linux 
 CVE-2023-6507 (An issue was found in CPython 3.12.0 `subprocess` module on 
POSIX plat ...)
-   TODO: check
+   - python3.12 3.12.1-1
+   - python3.11  (Vulnerable code not present)
+   - python3.10  (Vulnerable code not present)
+   - python3.9  (Vulnerable code not present)
+   - python3.7  (Vulnerable code not present)
+   - python2.7  (Vulnerable code not present)
+   NOTE: 
https://mail.python.org/archives/list/security-annou...@python.org/thread/AUL7QFHBLILGISS7U63B47AYSSGJJQZD/
+   NOTE: https://github.com/python/cpython/issues/112334
+   NOTE: https://github.com/python/cpython/pull/112617
 CVE-2023-6245 (The Candid library causes a Denial of Service while  parsing a 
special ...)
TODO: check
 CVE-2023-6146 (A Qualys web application was found to have a stored XSS 
vulnerability  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/abac4ea956f7fe2ee37d7df8ad85cd1c18347465

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/abac4ea956f7fe2ee37d7df8ad85cd1c18347465
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] automatic update

2023-12-09 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cc8ff646 by security tracker role at 2023-12-09T08:12:01+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,3 +1,29 @@
+CVE-2023-6394 (A flaw was found in Quarkus. This issue occurs when receiving a 
reques ...)
+   TODO: check
+CVE-2023-6337 (HashiCorp Vault and Vault Enterprise 1.12.0 and newer are 
vulnerable t ...)
+   TODO: check
+CVE-2023-6120 (The Welcart e-Commerce plugin for WordPress is vulnerable to 
Directory ...)
+   TODO: check
+CVE-2023-5756 (The Digital Publications by Supsystic plugin for WordPress is 
vulnerab ...)
+   TODO: check
+CVE-2023-49800 (`nuxt-api-party` is an open source module to proxy API 
requests. The l ...)
+   TODO: check
+CVE-2023-49799 (`nuxt-api-party` is an open source module to proxy API 
requests. nuxt- ...)
+   TODO: check
+CVE-2023-49798 (OpenZeppelin Contracts is a library for smart contract 
development. A  ...)
+   TODO: check
+CVE-2023-49797 (PyInstaller bundles a Python application and all its 
dependencies into ...)
+   TODO: check
+CVE-2023-48311 (dockerspawner is a tool to spawn JupyterHub single user 
servers in Doc ...)
+   TODO: check
+CVE-2023-47722 (IBM API Connect V10.0.5.3 and V10.0.6.0 stores user 
credentials in bro ...)
+   TODO: check
+CVE-2023-47465 (An issue in GPAC v.2.2.1 and before allows a local attacker to 
cause a ...)
+   TODO: check
+CVE-2023-47254 (An OS Command Injection in the CLI interface on DrayTek 
Vigor167 versi ...)
+   TODO: check
+CVE-2023-46932 (Heap Buffer Overflow vulnerability in GPAC version 
2.3-DEV-rev617-g671 ...)
+   TODO: check
 CVE-2023-6622 (A null pointer dereference vulnerability was found in 
nft_dynset_init( ...)
- linux 
[bullseye] - linux  (Vulnerable code not present)
@@ -454,7 +480,7 @@ CVE-2023-41106 (An issue was discovered in Zimbra 
Collaboration (ZCS) before 10.
NOT-FOR-US: Zimbra
 CVE-2023-40238 (A LogoFAIL issue was discovered in BmpDecoderDxe in Insyde 
InsydeH2O w ...)
NOT-FOR-US: Insyde
-CVE-2023-6560 [io_uring out of boundary memory access in __io_uaddr_map()]
+CVE-2023-6560 (An out-of-bounds memory access flaw was found in the io_uring 
SQ/CQ ri ...)
- linux 
[bookworm] - linux  (Vulnerable code not present)
[bullseye] - linux  (Vulnerable code not present)
@@ -566,18 +592,23 @@ CVE-2023-41268 (Improper input validation vulnerability 
in Samsung Open Source E
 CVE-2023-40053 (A vulnerability has been identified within Serv-U 15.4 that 
allows an  ...)
NOT-FOR-US: SolarWinds
 CVE-2023-6512 (Inappropriate implementation in Web Browser UI in Google Chrome 
prior  ...)
+   {DSA-5573-1}
- chromium 120.0.6099.71-1
[buster] - chromium  (see DSA 5046)
 CVE-2023-6511 (Inappropriate implementation in Autofill in Google Chrome prior 
to 120 ...)
+   {DSA-5573-1}
- chromium 120.0.6099.71-1
[buster] - chromium  (see DSA 5046)
 CVE-2023-6510 (Use after free in Media Capture in Google Chrome prior to 
120.0.6099.6 ...)
+   {DSA-5573-1}
- chromium 120.0.6099.71-1
[buster] - chromium  (see DSA 5046)
 CVE-2023-6509 (Use after free in Side Panel Search in Google Chrome prior to 
120.0.60 ...)
+   {DSA-5573-1}
- chromium 120.0.6099.71-1
[buster] - chromium  (see DSA 5046)
 CVE-2023-6508 (Use after free in Media Stream in Google Chrome prior to 
120.0.6099.62 ...)
+   {DSA-5573-1}
- chromium 120.0.6099.71-1
[buster] - chromium  (see DSA 5046)
 CVE-2023-39326 (A malicious HTTP sender can use chunk extensions to cause a 
receiver r ...)
@@ -20234,7 +20265,7 @@ CVE-2023-4104 (An invalid Polkit Authentication check 
and missing authentication
NOTE: 
https://github.com/mozilla-mobile/mozilla-vpn-client/commit/6933a07164cd69636889403c959ac2c2b115e0f6
 CVE-2023-3971 (An HTML injection flaw was found in Controller in the user 
interface s ...)
NOT-FOR-US: Red Hat Ansible Automation Controller
-CVE-2023-34320 [arm: Guests can trigger a deadlock on Cortex-A77]
+CVE-2023-34320 (Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 
1508412 where ...)
- xen 4.17.2-1
[bookworm] - xen  (Will be fixed via point release)
[bullseye] - xen  (EOLed in Bullseye)
@@ -37875,20 +37906,20 @@ CVE-2023-28876 (A Broken Access Control issue in 
comments to uploaded files in F
NOT-FOR-US: Filerun
 CVE-2023-28875 (A Stored XSS issue in shared files download terms in Filerun 
Update 20 ...)
NOT-FOR-US: Filerun
-CVE-2023-28874
-   RESERVED
-CVE-2023-28873
-   RESERVED
+CVE-2023-28874 (The next parameter in the /accounts/login endpoint of Seafile 
9.0.6 al ...)
+   TODO: check
+CVE-2023-28873 (An XSS issue in wiki and discussion pages in