Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits: 2a8f25ba by Moritz Mühlenhoff at 2024-03-13T09:58:16+01:00 bookworm/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: ===================================== data/CVE/list ===================================== @@ -583,6 +583,8 @@ CVE-2024-1487 (The Photos and Files Contest Gallery WordPress plugin before 21.3 NOT-FOR-US: WordPress plugin CVE-2024-1441 (An off-by-one error flaw was found in the udevListInterfacesByStatus() ...) - libvirt <unfixed> (bug #1066058) + [bookworm] - libvirt <no-dsa> (Minor issue) + [bullseye] - libvirt <no-dsa> (Minor issue) NOTE: Introduced by: https://gitlab.com/libvirt/libvirt/-/commit/5a33366f5c0b18c93d161bd144f9f079de4ac8ca (v1.0.0-rc1) NOTE: Introduced by: https://gitlab.com/libvirt/libvirt/-/commit/d6064e2759a24e0802f363e3a810dc5a7d7ebb15 (v5.10.0-rc1) NOTE: Fixed by: https://gitlab.com/libvirt/libvirt/-/commit/c664015fe3a7bf59db26686e9ed69af011c6ebb8 (v10.1.0) @@ -636,9 +638,13 @@ CVE-2024-2363 (** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in AOL NOT-FOR-US: AOL AIM Triton CVE-2024-2314 (If kernel headers need to be extracted, bcc will attempt to load them ...) - bpfcc <unfixed> + [bookworm] - bpfcc <no-dsa> (Minor issue) + [bullseye] - bpfcc <no-dsa> (Minor issue) NOTE: https://github.com/iovisor/bcc/commit/008ea09e891194c072f2a9305a3c872a241dc342 CVE-2024-2313 (If kernel headers need to be extracted, bpftrace will attempt to load ...) - bpftrace <unfixed> + [bookworm] - bpftrace <no-dsa> (Minor issue) + [bullseye] - bpftrace <no-dsa> (Minor issue) NOTE: https://github.com/bpftrace/bpftrace/commit/4be4b7191acb8218240e6b7178c30fa8c9b59998 CVE-2024-2184 (Buffer overflow in identifier field of WSD probe request process of Sm ...) NOT-FOR-US: Small Office Multifunction Printers and Laser Printers (Canon) @@ -1478,7 +1484,9 @@ CVE-2024-24785 (If errors returned from MarshalJSON methods contain user control - golang-1.22 1.22.1-1 - golang-1.21 1.21.8-1 - golang-1.19 <removed> + [bookworm] - golang-1.19 <no-dsa> (Minor issue) - golang-1.15 <removed> + [bullseye] - golang-1.15 <no-dsa> (Minor issue) - golang-1.11 <removed> [buster] - golang-1.11 <postponed> (Limited support, minor issue, follow bullseye DSAs/point-releases) NOTE: https://github.com/golang/go/issues/65697 @@ -1488,7 +1496,9 @@ CVE-2024-24784 (The ParseAddressList function incorrectly handles comments (text - golang-1.22 1.22.1-1 - golang-1.21 1.21.8-1 - golang-1.19 <removed> + [bookworm] - golang-1.19 <no-dsa> (Minor issue) - golang-1.15 <removed> + [bullseye] - golang-1.15 <no-dsa> (Minor issue) - golang-1.11 <removed> [buster] - golang-1.11 <postponed> (Limited support, minor issue, follow bullseye DSAs/point-releases) NOTE: https://github.com/golang/go/issues/65083 @@ -1498,7 +1508,9 @@ CVE-2024-24783 (Verifying a certificate chain which contains a certificate with - golang-1.22 1.22.1-1 - golang-1.21 1.21.8-1 - golang-1.19 <removed> + [bookworm] - golang-1.19 <no-dsa> (Minor issue) - golang-1.15 <removed> + [bullseye] - golang-1.15 <no-dsa> (Minor issue) - golang-1.11 <removed> [buster] - golang-1.11 <postponed> (Limited support, minor issue, follow bullseye DSAs/point-releases) NOTE: https://github.com/golang/go/issues/65390 @@ -1516,7 +1528,9 @@ CVE-2023-45290 (When parsing a multipart form (either explicitly with Request.Pa - golang-1.22 1.22.1-1 - golang-1.21 1.21.8-1 - golang-1.19 <removed> + [bookworm] - golang-1.19 <no-dsa> (Minor issue) - golang-1.15 <removed> + [bullseye] - golang-1.15 <no-dsa> (Minor issue) - golang-1.11 <removed> [buster] - golang-1.11 <postponed> (Limited support, minor issue, follow bullseye DSAs/point-releases) NOTE: https://github.com/golang/go/issues/65383 @@ -1526,7 +1540,9 @@ CVE-2023-45289 (When following an HTTP redirect to a domain which is not a subdo - golang-1.22 1.22.1-1 - golang-1.21 1.21.8-1 - golang-1.19 <removed> + [bookworm] - golang-1.19 <no-dsa> (Minor issue) - golang-1.15 <removed> + [bullseye] - golang-1.15 <no-dsa> (Minor issue) - golang-1.11 <removed> [buster] - golang-1.11 <postponed> (Limited support, minor issue, follow bullseye DSAs/point-releases) NOTE: https://github.com/golang/go/issues/65065 @@ -7405,6 +7421,7 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4 [bullseye] - knot-resolver <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used) [buster] - knot-resolver <ignored> (Too intrusive to backport) - pdns-recursor 4.9.3-1 (bug #1063852) + [bullseye] - pdns-recursor <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used) - unbound 1.19.1-1 (bug #1063845) - systemd 255.4-1 [bookworm] - systemd <no-dsa> (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release) @@ -7445,6 +7462,7 @@ CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 51 [bullseye] - knot-resolver <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used) [buster] - knot-resolver <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used) - pdns-recursor 4.9.3-1 (bug #1063852) + [bullseye] - pdns-recursor <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used) - unbound 1.19.1-1 (bug #1063845) - systemd 255.4-1 [bookworm] - systemd <no-dsa> (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release) @@ -8985,6 +9003,8 @@ CVE-2024-24768 (1Panel is an open source Linux server operation and maintenance NOT-FOR-US: 1Panel CVE-2024-24762 (`python-multipart` is a streaming multipart parser for Python. When us ...) - python-multipart 0.0.9-1 (bug #1063538) + [bookworm] - python-multipart <no-dsa> (Minor issue) + [bullseye] - python-multipart <no-dsa> (Minor issue) NOTE: Original report at fastapi: https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389 NOTE: But the fix is within python-multipart: NOTE: https://github.com/Kludex/python-multipart/commit/20f0ef6b4e4caf7d69a667c54dff57fe467109a4 (0.0.7) ===================================== data/dsa-needed.txt ===================================== @@ -22,8 +22,12 @@ dav1d -- dnsdist (jmm) -- +dnsmasq +-- expat (carnil) -- +fontforge +-- frr -- gpac/oldstable @@ -85,6 +89,8 @@ ruby3.1/stable -- ruby-nokogiri/oldstable -- +ruby-rack +-- ruby-rails-html-sanitizer -- ruby-sinatra/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2a8f25ba580442788930760d6b1673e6712772b7 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2a8f25ba580442788930760d6b1673e6712772b7 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits