Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
a42dd7ee by Salvatore Bonaccorso at 2025-05-19T20:57:10+02:00
Scpecify which CVE is for which scope for libmojolicious-perl issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -4904,14 +4904,12 @@ CVE-2024-58135 (Mojolicious versions from 7.28 through
9.40 for Perl may generat
[bullseye] - libmojolicious-perl <ignored> (Minor issue, upstream's fix
requires newer libcryptx-perl)
NOTE: https://lists.security.metacpan.org/cve-announce/msg/29241187/
NOTE: https://github.com/mojolicious/mojo/pull/2200
- NOTE: The problem does not occur if the user has configured a
- NOTE: cryptographically secure HMAC session secret, and upstream
- NOTE: expects users to already be doing that for production
- NOTE: deployments. In addition, upstream has installed commit
- NOTE: c82071556c569a251152892c8cc2fd0ad5a4be54 such that recent
- NOTE: Mojolicious automatically generates a secure session secret.
- NOTE: However, that commit requires libcryptx-perl >=0.080, which is
- NOTE: only in trixie or newer.
+ NOTE: The problem does not occur if the user has configured a
cryptographically
+ NOTE: secure HMAC session secret, and upstream expects users to already
be doing
+ NOTE: that for production deployments. In addition, upstream has
installed commit
+ NOTE: c82071556c569a251152892c8cc2fd0ad5a4be54 such that recent
Mojolicious
+ NOTE: automatically generates a secure session secret.
+ NOTE: However, that commit requires libcryptx-perl >=0.080.
CVE-2024-58134 (Mojolicious versions from 0.999922 through 9.40 for Perl uses
a hard c ...)
- libmojolicious-perl <unfixed> (bug #1104648)
[bookworm] - libmojolicious-perl <no-dsa> (Minor issue)
@@ -4919,14 +4917,8 @@ CVE-2024-58134 (Mojolicious versions from 0.999922
through 9.40 for Perl uses a
NOTE: https://lists.security.metacpan.org/cve-announce/msg/29247502/
NOTE: https://github.com/mojolicious/mojo/pull/1791
NOTE: https://github.com/mojolicious/mojo/pull/2200
- NOTE: The problem does not occur if the user has configured a
- NOTE: cryptographically secure HMAC session secret, and upstream
- NOTE: expects users to already be doing that for production
- NOTE: deployments. In addition, upstream has installed commit
- NOTE: c82071556c569a251152892c8cc2fd0ad5a4be54 such that recent
- NOTE: Mojolicious automatically generates a secure session secret.
- NOTE: However, that commit requires libcryptx-perl >=0.080, which is
- NOTE: only in trixie or newer.
+ NOTE: The CVE covers the default static/guessable, and this behaviour
is unchanged by the
+ NOTE: optional CryptX dependency.
CVE-2025-4222 (The Database Toolset plugin for WordPress is vulnerable to
Sensitive I ...)
NOT-FOR-US: WordPress plugin
CVE-2025-4218 (A vulnerability was found in handrew browserpilot up to 0.2.51.
It has ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a42dd7eec34c4cc037cf24efc2265bff4e8517f4
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a42dd7eec34c4cc037cf24efc2265bff4e8517f4
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits