summaryrefslogtreecommitdiffstats
path: root/data
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-02-10 09:24:21 +0000
committerSalvatore Bonaccorso <carnil@debian.org>2024-02-10 09:24:21 +0000
commit2415d8287e26a297b81274cb5b9abb842a55e880 (patch)
tree797f71bb42ac05538ece64ae56d410b3a4dddc24 /data
parentec0e55f6825bf0122baa257f36d26bfc7529fea5 (diff)
parente0dcd7c0360e2955934e44a96d11a6ff337ddbde (diff)
Merge branch 'bookworm-12.5' into 'master'
Merge changes accepted for bookworm 12.5 release See merge request security-tracker-team/security-tracker!163
Diffstat (limited to 'data')
-rw-r--r--data/CVE/list86
-rw-r--r--data/next-point-update.txt100
2 files changed, 50 insertions, 136 deletions
diff --git a/data/CVE/list b/data/CVE/list
index 09821ade9d..fa95f3d821 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -1965,10 +1965,12 @@ CVE-2024-1087
REJECTED
CVE-2024-1086 (A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...)
- linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
NOTE: https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
NOTE: https://git.kernel.org/linus/f342de4e2f33e0e39165d8639387aa6c19dff660 (6.8-rc2)
CVE-2024-1085 (A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...)
- linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE: https://kernel.dance/b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
@@ -2453,6 +2455,7 @@ CVE-2024-0986 (A vulnerability was found in Issabel PBX 4.0.0. It has been rated
NOT-FOR-US: Issabel PBX
CVE-2023-52340 [ipv6: remove max_size check inline with ipv4]
- linux 6.3.7-1
+ [bookworm] - linux 6.1.76-1
NOTE: https://git.kernel.org/linus/af6d10345ca76670c1b7c37799f0d5576ccef277 (6.3-rc1)
CVE-2024-0841 (A null pointer dereference flaw was found in the hugetlbfs_fill_super ...)
- linux <unfixed>
@@ -2859,6 +2862,7 @@ CVE-2024-0914 (A timing side-channel vulnerability has been discovered in the op
NOTE: https://people.redhat.com/~hkario/marvin/
CVE-2024-0911 (A flaw was found in Indent. This issue may allow a local user to use a ...)
- indent 2.2.13-4 (unimportant; bug #1061543)
+ [bookworm] - indent 2.2.12-4+deb12u3
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2259883
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2260399
NOTE: https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00001.html
@@ -3355,6 +3359,7 @@ CVE-2024-23850 (In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel
NOTE: https://lore.kernel.org/all/6a80cb4b32af89787dadee728310e5e2ca85343f.1705741883.git.wqu%40suse.com/
CVE-2024-23849 (In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel thro ...)
- linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
NOTE: https://lore.kernel.org/netdev/1705715319-19199-1-git-send-email-sharath.srinivasan%40oracle.com/
CVE-2024-23848 (In the Linux kernel through 6.7.1, there is a use-after-free in cec_qu ...)
- linux <unfixed>
@@ -3377,6 +3382,7 @@ CVE-2024-23180 (Improper input validation vulnerability in a-blog cms Ver.3.1.x
NOT-FOR-US: a-blog cms
CVE-2024-22705 (An issue was discovered in ksmbd in the Linux kernel before 6.6.10. sm ...)
- linux 6.6.11-1
+ [bookworm] - linux 6.1.76-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/d10c77873ba1e9e6b91905018e29e196fd5f863d (6.7-rc8)
@@ -3708,18 +3714,19 @@ CVE-2020-36771 (CloudLinux CageFS 7.1.1-1 or below passes the authentication to
NOT-FOR-US: CloudLinux CageFS
CVE-2023-46840 [VT-d: Failure to quarantine devices in !HVM builds]
- xen 4.17.3+10-g091466ba55-1
- [bookworm] - xen <postponed> (Fix along in next update)
+ [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1
[bullseye] - xen <not-affected> (Vulnerable code not present)
[buster] - xen <not-affected> (Vulnerable code not present)
NOTE: https://xenbits.xen.org/xsa/advisory-450.html
CVE-2023-46839 [pci: phantom functions assigned to incorrect contexts]
- xen 4.17.3+10-g091466ba55-1
- [bookworm] - xen <postponed> (Fix along in next update)
+ [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1
[bullseye] - xen <end-of-life> (EOLed in Bullseye)
[buster] - xen <end-of-life> (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-449.html
CVE-2023-46838 (Transmit requests in Xen's virtual network protocol can consist of mul ...)
- linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
NOTE: https://xenbits.xen.org/xsa/advisory-448.html
NOTE: https://git.kernel.org/linus/c7ec4f2d684e17d69bbdd7c4324db0ef5daac26a
CVE-2024-23771 (darkhttpd before 1.15 uses strcmp (which is not constant time) to veri ...)
@@ -4187,7 +4194,7 @@ CVE-2023-31274 (AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain
CVE-2024-23525 (The Spreadsheet::ParseXLSX package before 0.30 for Perl allows XXE att ...)
{DLA-3723-1}
- libspreadsheet-parsexlsx-perl 0.31-1 (bug #1061098)
- [bookworm] - libspreadsheet-parsexlsx-perl <no-dsa> (Slight minor issue; will be fixed in point release)
+ [bookworm] - libspreadsheet-parsexlsx-perl 0.27-3+deb12u2
[bullseye] - libspreadsheet-parsexlsx-perl <no-dsa> (Slight minor issue; will be fixed in point release)
NOTE: https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a
NOTE: https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10
@@ -4653,7 +4660,7 @@ CVE-2024-0569 (A vulnerability classified as problematic has been found in Totol
NOT-FOR-US: Totolink
CVE-2024-0567 (A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTL ...)
- gnutls28 3.8.3-1 (bug #1061045)
- [bookworm] - gnutls28 <no-dsa> (Minor issue)
+ [bookworm] - gnutls28 3.7.9-2+deb12u2
[bullseye] - gnutls28 <no-dsa> (Minor issue)
[buster] - gnutls28 <no-dsa> (Minor issue)
NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1521
@@ -4668,7 +4675,7 @@ CVE-2024-0554 (A Cross-site scripting (XSS) vulnerability has been found on WIC1
NOT-FOR-US: WIC200
CVE-2024-0553 (A vulnerability was found in GnuTLS. The response times to malformed c ...)
- gnutls28 3.8.3-1 (bug #1061046)
- [bookworm] - gnutls28 <no-dsa> (Minor issue)
+ [bookworm] - gnutls28 3.7.9-2+deb12u2
[bullseye] - gnutls28 <not-affected> (Incomplete fix for CVE-2023-5981 not published officially in any Debian bullseye release)
NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1522
NOTE: https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-14
@@ -5010,6 +5017,7 @@ CVE-2023-6941 (The Keap Official Opt-in Forms WordPress plugin through 1.0.11 do
NOT-FOR-US: WordPress plugin
CVE-2023-6915 (A Null pointer dereference problem was found in ida_free in lib/idr.c ...)
- linux 6.6.13-1
+ [bookworm] - linux 6.1.76-1
NOTE: https://git.kernel.org/linus/af73483f4e8b6f5c68c9aa63257bdd929a9c194a (6.7-rc7)
CVE-2023-6843 (The easy.jobs- Best Recruitment Plugin for Job Board Listing, Manager, ...)
NOT-FOR-US: WordPress plugin
@@ -5241,7 +5249,7 @@ CVE-2023-51804 (An issue in rymcu forest v.0.02 allows a remote attacker to obta
NOT-FOR-US: rymcu forest
CVE-2023-51698 (Atril is a simple multi-page document viewer. Atril is vulnerable to a ...)
- atril 1.26.1-4 (bug #1060751)
- [bookworm] - atril <no-dsa> (Minor issue)
+ [bookworm] - atril 1.26.0-2+deb12u2
[bullseye] - atril <no-dsa> (Minor issue)
- evince 3.25.92-1
NOTE: https://github.com/mate-desktop/atril/security/advisories/GHSA-34rr-j8v9-v4p2
@@ -5333,7 +5341,7 @@ CVE-2024-0459 (A vulnerability has been found in Blood Bank & Donor Management 5
NOT-FOR-US: Blood Bank & Donor Management
CVE-2023-6683 (A flaw was found in the QEMU built-in VNC server while processing Clie ...)
- qemu 1:8.2.0+ds-5 (bug #1060749)
- [bookworm] - qemu <no-dsa> (Minor issue)
+ [bookworm] - qemu 1:7.2+dfsg-7+deb12u4
[bullseye] - qemu <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2254825
NOTE: Proposed patch: https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html
@@ -5383,7 +5391,7 @@ CVE-2010-10011 (A vulnerability, which was classified as problematic, was found
NOT-FOR-US: Acritum Femitter Server
CVE-2024-23659 (SPIP before 4.1.14 and 4.2.x before 4.2.8 allows XSS via the name of a ...)
- spip 4.1.15+dfsg-1
- [bookworm] - spip <no-dsa> (Minor issue)
+ [bookworm] - spip 4.1.9+dfsg-1+deb12u4
[bullseye] - spip <not-affected> (Vulnerable code not present)
[buster] - spip <not-affected> (Vulnerable code not present)
NOTE: https://git.spip.net/spip/bigup/commit/ada821c076d67d1147a195178223d0b4a6d8cecc
@@ -6243,7 +6251,7 @@ CVE-2024-22370 (In JetBrains YouTrack before 2023.3.22666 stored XSS via markdow
CVE-2024-22368 (The Spreadsheet::ParseXLSX package before 0.28 for Perl can encounter ...)
{DLA-3723-1}
- libspreadsheet-parsexlsx-perl 0.29-1
- [bookworm] - libspreadsheet-parsexlsx-perl <no-dsa> (Minor issue; DoS, can be fixed in point release)
+ [bookworm] - libspreadsheet-parsexlsx-perl 0.27-3+deb12u1
[bullseye] - libspreadsheet-parsexlsx-perl <no-dsa> (Minor issue; DoS, can be fixed in point release)
NOTE: https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md
NOTE: Fixed by: https://github.com/MichaelDaum/spreadsheet-parsexlsx/commit/39b25b91fcb939a9c8ea807fdc80386c1ae5be0c (0.28)
@@ -7312,7 +7320,7 @@ CVE-2024-21907 (Newtonsoft.Json before version 13.0.1 is affected by a mishandli
NOT-FOR-US: Newtonsoft.Json
CVE-2024-21633 (Apktool is a tool for reverse engineering Android APK files. In versio ...)
- apktool 2.7.0+dfsg-7 (bug #1060013)
- [bookworm] - apktool <no-dsa> (Minor issue)
+ [bookworm] - apktool 2.7.0+dfsg-6+deb12u1
[bullseye] - apktool <no-dsa> (Minor issue)
[buster] - apktool <no-dsa> (Minor issue)
NOTE: https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-2hqv-2xv4-5h5w
@@ -7617,7 +7625,7 @@ CVE-2015-10128 (A vulnerability was found in rt-prettyphoto Plugin up to 1.2 on
NOT-FOR-US: WordPress plugin
CVE-2023-6693 (A stack based buffer overflow was found in the virtio-net device of QE ...)
- qemu 1:8.2.0+ds-3
- [bookworm] - qemu <no-dsa> (Minor issue)
+ [bookworm] - qemu 1:7.2+dfsg-7+deb12u4
[bullseye] - qemu <no-dsa> (Minor issue)
[buster] - qemu <not-affected> (Vulnerable code introduced later)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2254580
@@ -8711,7 +8719,7 @@ CVE-2023-51765 (sendmail through 8.17.2 allows SMTP smuggling in certain configu
CVE-2023-51764 (Postfix through 3.8.5 allows SMTP smuggling unless configured with smt ...)
{DLA-3725-1}
- postfix 3.8.4-1 (bug #1059230)
- [bookworm] - postfix <no-dsa> (Minor issue; mitigations exist)
+ [bookworm] - postfix 3.7.9-0+deb12u1
[bullseye] - postfix <no-dsa> (Minor issue; mitigations exist)
NOTE: https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
NOTE: https://www.openwall.com/lists/oss-security/2023/12/21/6
@@ -8932,7 +8940,7 @@ CVE-2023-39251 (Dell BIOS contains an Improper Input Validation vulnerability. A
NOT-FOR-US: Dell
CVE-2023-52322 (ecrire/public/assembler.php in SPIP before 4.1.13 and 4.2.x before 4.2 ...)
- spip 4.1.13+dfsg-1 (bug #1059331)
- [bookworm] - spip <no-dsa> (Minor issue)
+ [bookworm] - spip 4.1.9+dfsg-1+deb12u4
[bullseye] - spip <no-dsa> (Minor issue)
[buster] - spip <no-dsa> (Minor issue)
NOTE: https://blog.spip.net/Mise-a-jour-de-maintenance-et-securite-sortie-de-SPIP-4-2-7-SPIP-4-1-13.html?lang=fr
@@ -8971,7 +8979,7 @@ CVE-2023-6690 (A race condition in GitHub Enterprise Server allowed an existing
NOT-FOR-US: GitHub Enterprise Server
CVE-2023-51713 (make_ftp_cmd in main.c in ProFTPD before 1.3.8a has a one-byte out-of- ...)
- proftpd-dfsg 1.3.8.a+dfsg-1
- [bookworm] - proftpd-dfsg <no-dsa> (Minor issue)
+ [bookworm] - proftpd-dfsg 1.3.8+dfsg-4+deb12u3
[bullseye] - proftpd-dfsg <no-dsa> (Minor issue)
[buster] - proftpd-dfsg <no-dsa> (Minor issue)
NOTE: https://github.com/proftpd/proftpd/issues/1683
@@ -9342,7 +9350,7 @@ CVE-2023-7018 (Deserialization of Untrusted Data in GitHub repository huggingfac
NOT-FOR-US: Transformers
CVE-2023-7008 (A vulnerability was found in systemd-resolved. This issue may allow sy ...)
- systemd 255.1-3 (bug #1059278)
- [bookworm] - systemd <no-dsa> (Minor issue)
+ [bookworm] - systemd 252.21-1~deb12u1
[bullseye] - systemd <no-dsa> (Minor issue)
[buster] - systemd <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2222672
@@ -10020,7 +10028,7 @@ CVE-2023-32230 (An improper handling of a malformed API request to an API server
CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, found in O ...)
{DSA-5601-1 DSA-5600-1 DSA-5599-1 DSA-5591-1 DSA-5588-1 DSA-5586-1 DLA-3730-1 DLA-3719-1 DLA-3718-1 DLA-3694-1}
- dropbear 2022.83-4 (bug #1059001)
- [bookworm] - dropbear <no-dsa> (Minor issue)
+ [bookworm] - dropbear 2022.83-1+deb12u1
[bullseye] - dropbear <no-dsa> (Minor issue)
[buster] - dropbear <not-affected> (ChaCha20-Poly1305 support introduced in 2020.79; *-EtM not supported as of 2022.83)
- erlang 1:25.3.2.8+dfsg-1 (bug #1059002)
@@ -10028,7 +10036,7 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun
[bullseye] - erlang <no-dsa> (Minor issue)
[buster] - erlang <no-dsa> (Minor issue)
- filezilla 3.66.4-1
- [bookworm] - filezilla <no-dsa> (Minor issue)
+ [bookworm] - filezilla 3.63.0-1+deb12u3
[bullseye] - filezilla <no-dsa> (Minor issue)
[buster] - filezilla <no-dsa> (Minor issue)
- golang-go.crypto 1:0.17.0-1 (bug #1059003)
@@ -10049,11 +10057,11 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun
- php-phpseclib 2.0.46-1
- php-phpseclib3 3.0.35-1
- proftpd-dfsg 1.3.8.b+dfsg-1 (bug #1059144)
- [bookworm] - proftpd-dfsg <no-dsa> (Minor issue)
+ [bookworm] - proftpd-dfsg 1.3.8+dfsg-4+deb12u3
[bullseye] - proftpd-dfsg <no-dsa> (Minor issue)
[buster] - proftpd-dfsg <no-dsa> (Minor issue)
- proftpd-mod-proxy 0.9.3-1 (bug #1059290)
- [bookworm] - proftpd-mod-proxy <no-dsa> (Minor issue)
+ [bookworm] - proftpd-mod-proxy 0.9.2-1+deb12u1
[bullseye] - proftpd-mod-proxy <no-dsa> (Minor issue)
- putty 0.80-1
- python-asyncssh <unfixed> (bug #1059007)
@@ -11431,7 +11439,7 @@ CVE-2023-42495 (Dasan Networks - W-Web versions 1.22-1.27 - CWE-78: Improper Neu
CVE-2023-34194 (StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML ...)
{DLA-3701-1}
- tinyxml 2.6.2-6.1 (bug #1059315)
- [bookworm] - tinyxml <no-dsa> (Minor issue)
+ [bookworm] - tinyxml 2.6.2-6+deb12u1
[bullseye] - tinyxml <no-dsa> (Minor issue)
NOTE: https://www.forescout.com/resources/sierra21-vulnerabilities
NOTE: Debian (non upstream) patch: https://salsa.debian.org/debian/tinyxml/-/raw/2366e1f23d059d4c20c43c54176b6bd78d6a83fc/debian/patches/CVE-2023-34194.patch
@@ -11650,35 +11658,35 @@ CVE-2023-4932 (SAS application is vulnerable to Reflected Cross-Site Scripting (
NOT-FOR-US: SAS
CVE-2023-49994 (Espeak-ng 1.52-dev was discovered to contain a Floating Point Exceptio ...)
- espeak-ng 1.51+dfsg-12 (bug #1059060)
- [bookworm] - espeak-ng <no-dsa> (Minor issue)
+ [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1
[bullseye] - espeak-ng <no-dsa> (Minor issue)
[buster] - espeak-ng <no-dsa> (Minor issue)
NOTE: https://github.com/espeak-ng/espeak-ng/issues/1823
NOTE: https://github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c
CVE-2023-49993 (Espeak-ng 1.52-dev was discovered to contain a Buffer Overflow via the ...)
- espeak-ng 1.51+dfsg-12 (bug #1059060)
- [bookworm] - espeak-ng <no-dsa> (Minor issue)
+ [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1
[bullseye] - espeak-ng <no-dsa> (Minor issue)
[buster] - espeak-ng <no-dsa> (Minor issue)
NOTE: https://github.com/espeak-ng/espeak-ng/issues/1826
NOTE: https://github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c
CVE-2023-49992 (Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Overflow v ...)
- espeak-ng 1.51+dfsg-12 (bug #1059060)
- [bookworm] - espeak-ng <no-dsa> (Minor issue)
+ [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1
[bullseye] - espeak-ng <no-dsa> (Minor issue)
[buster] - espeak-ng <no-dsa> (Minor issue)
NOTE: https://github.com/espeak-ng/espeak-ng/issues/1827
NOTE: https://github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c
CVE-2023-49991 (Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Underflow ...)
- espeak-ng 1.51+dfsg-12 (bug #1059060)
- [bookworm] - espeak-ng <no-dsa> (Minor issue)
+ [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1
[bullseye] - espeak-ng <no-dsa> (Minor issue)
[buster] - espeak-ng <no-dsa> (Minor issue)
NOTE: https://github.com/espeak-ng/espeak-ng/issues/1825
NOTE: https://github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c
CVE-2023-49990 (Espeak-ng 1.52-dev was discovered to contain a buffer-overflow via the ...)
- espeak-ng 1.51+dfsg-12 (bug #1059060)
- [bookworm] - espeak-ng <no-dsa> (Minor issue)
+ [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1
[bullseye] - espeak-ng <no-dsa> (Minor issue)
[buster] - espeak-ng <no-dsa> (Minor issue)
NOTE: https://github.com/espeak-ng/espeak-ng/issues/1824
@@ -11938,7 +11946,7 @@ CVE-2023-6356 (A flaw was found in the Linux kernel's NVMe driver. This issue ma
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2254054
CVE-2023-39804 [Incorrectly handled extension attributes in PAX archives can lead to a crash]
- tar 1.34+dfsg-1.3 (bug #1058079)
- [bookworm] - tar <no-dsa> (Minor issue)
+ [bookworm] - tar 1.34+dfsg-1.2+deb12u1
[bullseye] - tar <no-dsa> (Minor issue)
[buster] - tar <no-dsa> (Minor issue)
NOTE: Fixed by: https://git.savannah.gnu.org/cgit/tar.git/commit/?id=a339f05cd269013fa133d2f148d73f6f7d4247e4 (v1.35)
@@ -12050,6 +12058,7 @@ CVE-2023-6646 (A vulnerability classified as problematic has been found in linkd
NOT-FOR-US: linkding
CVE-2023-50431 (sec_attest_info in drivers/accel/habanalabs/common/habanalabs_ioctl.c ...)
- linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE: https://lists.freedesktop.org/archives/dri-devel/2023-November/431772.html
@@ -12120,6 +12129,7 @@ CVE-2023-6611 (A vulnerability was found in Tongda OA 2017 up to 11.9. It has be
NOT-FOR-US: Tongda OA
CVE-2023-6610 (An out-of-bounds read vulnerability was found in smb2_dump_detail in f ...)
- linux 6.6.13-1 (unimportant)
+ [bookworm] - linux 6.1.76-1
NOTE: CONFIG_CIFS_DEBUG2 not enabled in Debian
NOTE: https://git.kernel.org/linus/567320c46a60a3c39b69aa1df802d753817a3f86
CVE-2023-6609 (A vulnerability was found in osCommerce 4. It has been classified as p ...)
@@ -12131,6 +12141,7 @@ CVE-2023-6607 (A vulnerability has been found in Tongda OA 2017 up to 11.10 and
CVE-2023-6606 (An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb ...)
{DLA-3710-1}
- linux 6.6.9-1
+ [bookworm] - linux 6.1.76-1
NOTE: https://bugzilla.kernel.org/show_bug.cgi?id=218218
NOTE: https://git.kernel.org/linus/b35858b3786ddbb56e1c35138ba25d6adf8d0bef
CVE-2023-6507 (An issue was found in CPython 3.12.0 `subprocess` module on POSIX plat ...)
@@ -12329,21 +12340,21 @@ CVE-2023-49492 (DedeCMS v5.7.111 was discovered to contain a reflective cross-si
CVE-2023-49468 (Libde265 v1.0.14 was discovered to contain a global buffer overflow vu ...)
{DLA-3699-1}
- libde265 1.0.15-1 (bug #1059275)
- [bookworm] - libde265 <no-dsa> (Minor issue)
+ [bookworm] - libde265 1.0.11-1+deb12u2
[bullseye] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/432
NOTE: Fixed by: https://github.com/strukturag/libde265/commit/3e822a3ccf88df1380b165d6ce5a00494a27ceeb (v1.0.15)
CVE-2023-49467 (Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vuln ...)
{DLA-3699-1}
- libde265 1.0.15-1 (bug #1059275)
- [bookworm] - libde265 <no-dsa> (Minor issue)
+ [bookworm] - libde265 1.0.11-1+deb12u2
[bullseye] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/434
NOTE: Fixed by: https://github.com/strukturag/libde265/commit/7e4faf254bbd2e52b0f216cb987573a2cce97b54 (v1.0.15)
CVE-2023-49465 (Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vuln ...)
{DLA-3699-1}
- libde265 1.0.15-1 (bug #1059275)
- [bookworm] - libde265 <no-dsa> (Minor issue)
+ [bookworm] - libde265 1.0.11-1+deb12u2
[bullseye] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/435
NOTE: Fixed by: https://github.com/strukturag/libde265/commit/1475c7d2f0a6dc35c27e18abc4db9679bfd32568 (v1.0.15)
@@ -12896,7 +12907,7 @@ CVE-2023-49289 (Ajax.NET Professional (AjaxPro) is an AJAX framework for Microso
NOT-FOR-US: Ajax.NET Professional
CVE-2023-49284 (fish is a smart and user-friendly command line shell for macOS, Linux, ...)
- fish 3.6.4-1 (bug #1057455)
- [bookworm] - fish <no-dsa> (Minor issue)
+ [bookworm] - fish 3.6.0-3.1+deb12u1
[bullseye] - fish <no-dsa> (Minor issue)
[buster] - fish <no-dsa> (Minor issue)
NOTE: https://github.com/fish-shell/fish-shell/security/advisories/GHSA-2j9r-pm96-wp4f
@@ -19970,6 +19981,7 @@ CVE-2023-33517 (carRental 1.0 is vulnerable to Incorrect Access Control (Arbitra
NOT-FOR-US: carRental
CVE-2023-5633 (The reference count changes made as part of the CVE-2023-33951 and CVE ...)
- linux 6.5.8-1
+ [bookworm] - linux 6.1.76-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/91398b413d03660fd5828f7b4abc64e884b98069 (6.6-rc6)
@@ -20087,7 +20099,7 @@ CVE-2023-46306 (The web administration interface in NetModule Router Software (N
NOT-FOR-US: NetModule Router Software
CVE-2023-46303 (link_to_local_path in ebooks/conversion/plugins/html_input.py in calib ...)
- calibre 6.19.1-1
- [bookworm] - calibre <no-dsa> (Minor issue)
+ [bookworm] - calibre 6.13.0+repack-2+deb12u3
[bullseye] - calibre <no-dsa> (Minor issue)
[buster] - calibre <no-dsa> (Minor issue)
NOTE: https://github.com/0x1717/ssrf-via-img
@@ -22665,7 +22677,7 @@ CVE-2023-34324 (Closing of an event channel in the Linux kernel can result in a
NOTE: https://git.kernel.org/linus/87797fad6cce28ec9be3c13f031776ff4f104cfc (6.6-rc6)
CVE-2023-46837 (Arm provides multiple helpers to clean & invalidate the cache for a gi ...)
- xen 4.17.3+10-g091466ba55-1
- [bookworm] - xen <postponed> (Minor issue, fix along in next DSA)
+ [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1
[bullseye] - xen <end-of-life> (EOLed in Bullseye)
[buster] - xen <end-of-life> (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-447.html
@@ -34405,7 +34417,7 @@ CVE-2018-25088 (A vulnerability, which was classified as critical, was found in
NOT-FOR-US: Blue Yonder postgraas_server
CVE-2023-3724 (If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor ...)
- wolfssl 5.5.4-2.1 (bug #1041699)
- [bookworm] - wolfssl <no-dsa> (Minor issue)
+ [bookworm] - wolfssl 5.5.4-2+deb12u1
[bullseye] - wolfssl <no-dsa> (Minor issue)
NOTE: https://github.com/wolfSSL/wolfssl/pull/6412
NOTE: https://github.com/wolfSSL/wolfssl/commit/00f1eddee429ff51390b20caadd2eb6afe51e1aa (v5.6.2-stable)
@@ -37264,9 +37276,9 @@ CVE-2023-3327
REJECTED
CVE-2023-36464 (pypdf is an open source, pure-python PDF library. In affected versions ...)
- pypdf 3.17.4-1 (bug #1040338)
- [bookworm] - pypdf <no-dsa> (Minor issue)
+ [bookworm] - pypdf 3.4.1-1+deb12u1
- pypdf2 2.12.1-4 (bug #1040339)
- [bookworm] - pypdf2 <no-dsa> (Minor issue)
+ [bookworm] - pypdf2 2.12.1-3+deb12u1
[bullseye] - pypdf2 <not-affected> (Vulnerable code not present)
[buster] - pypdf2 <not-affected> (Vulnerable code not present)
NOTE: https://github.com/py-pdf/pypdf/security/advisories/GHSA-4vvm-4w3v-6mr8
@@ -54094,6 +54106,7 @@ CVE-2023-1194 (An out-of-bounds (OOB) memory read flaw was found in parse_lease_
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2154176
CVE-2023-1193 (A use-after-free flaw was found in setup_async_work in the KSMBD imple ...)
- linux 6.3.7-1
+ [bookworm] - linux 6.1.76-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2154177
@@ -63375,6 +63388,7 @@ CVE-2022-48304
RESERVED
CVE-2022-48303 (GNU Tar through 1.34 has a one-byte out-of-bounds read that results in ...)
- tar 1.34+dfsg-1.4 (unimportant)
+ [bookworm] - tar 1.34+dfsg-1.2+deb12u1
NOTE: Crash in CLI tool, no security impact
NOTE: https://savannah.gnu.org/bugs/?62387
NOTE: https://savannah.gnu.org/patch/?10307
@@ -73526,7 +73540,7 @@ CVE-2023-22085 (Vulnerability in the Hospitality OPERA 5 Property Services produ
CVE-2023-22084 (Vulnerability in the MySQL Server product of Oracle MySQL (component: ...)
{DLA-3722-1}
- mariadb 1:10.11.6-1
- [bookworm] - mariadb <no-dsa> (Minor issue, will be fixed via point update)
+ [bookworm] - mariadb 1:10.11.6-0+deb12u1
- mariadb-10.5 <removed>
[bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed via point update)
- mariadb-10.3 <removed>
diff --git a/data/next-point-update.txt b/data/next-point-update.txt
index e20ab14aaa..3f1fca84af 100644
--- a/data/next-point-update.txt
+++ b/data/next-point-update.txt
@@ -1,103 +1,3 @@
-CVE-2023-3724
- [bookworm] - wolfssl 5.5.4-2+deb12u1
-CVE-2023-22084
- [bookworm] - mariadb 1:10.11.6-0+deb12u1
-CVE-2023-49284
- [bookworm] - fish 3.6.0-3.1+deb12u1
-CVE-2023-52322
- [bookworm] - spip 4.1.9+dfsg-1+deb12u4
-CVE-2024-23659
- [bookworm] - spip 4.1.9+dfsg-1+deb12u4
-CVE-2023-51764
- [bookworm] - postfix 3.7.9-0+deb12u1
-CVE-2023-7008
- [bookworm] - systemd 252.21-1~deb12u1
-CVE-2023-49994
- [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1
-CVE-2023-49993
- [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1
-CVE-2023-49992
- [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1
-CVE-2023-49991
- [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1
-CVE-2023-49990
- [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1
-CVE-2023-48795
- [bookworm] - filezilla 3.63.0-1+deb12u3
-CVE-2023-48795
- [bookworm] - dropbear 2022.83-1+deb12u1
-CVE-2023-49465
- [bookworm] - libde265 1.0.11-1+deb12u2
-CVE-2023-49467
- [bookworm] - libde265 1.0.11-1+deb12u2
-CVE-2023-49468
- [bookworm] - libde265 1.0.11-1+deb12u2
-CVE-2023-48795
- [bookworm] - proftpd-dfsg 1.3.8+dfsg-4+deb12u3
-CVE-2023-51713
- [bookworm] - proftpd-dfsg 1.3.8+dfsg-4+deb12u3
-CVE-2024-21633
- [bookworm] - apktool 2.7.0+dfsg-6+deb12u1
-CVE-2023-46303
- [bookworm] - calibre 6.13.0+repack-2+deb12u3
-CVE-2024-22368
- [bookworm] - libspreadsheet-parsexlsx-perl 0.27-3+deb12u1
-CVE-2024-23525
- [bookworm] - libspreadsheet-parsexlsx-perl 0.27-3+deb12u2
-CVE-2023-48795
- [bookworm] - proftpd-mod-proxy 0.9.2-1+deb12u1
-CVE-2023-36464
- [bookworm] - pypdf 3.4.1-1+deb12u1
-CVE-2023-36464
- [bookworm] - pypdf2 2.12.1-3+deb12u1
-CVE-2022-48303
- [bookworm] - tar 1.34+dfsg-1.2+deb12u1
-CVE-2023-39804
- [bookworm] - tar 1.34+dfsg-1.2+deb12u1
-CVE-2024-0567
- [bookworm] - gnutls28 3.7.9-2+deb12u2
-CVE-2024-0553
- [bookworm] - gnutls28 3.7.9-2+deb12u2
-CVE-2023-34194
- [bookworm] - tinyxml 2.6.2-6+deb12u1
-CVE-2023-51698
- [bookworm] - atril 1.26.0-2+deb12u2
-CVE-2023-6693
- [bookworm] - qemu 1:7.2+dfsg-7+deb12u4
-CVE-2023-6683
- [bookworm] - qemu 1:7.2+dfsg-7+deb12u4
-CVE-2024-0911
- [bookworm] - indent 2.2.12-4+deb12u3
-CVE-2023-1193
- [bookworm] - linux 6.1.76-1
-CVE-2023-46838
- [bookworm] - linux 6.1.76-1
-CVE-2023-50431
- [bookworm] - linux 6.1.76-1
-CVE-2023-52340
- [bookworm] - linux 6.1.76-1
-CVE-2023-5633
- [bookworm] - linux 6.1.76-1
-CVE-2023-6606
- [bookworm] - linux 6.1.76-1
-CVE-2023-6610
- [bookworm] - linux 6.1.76-1
-CVE-2023-6915
- [bookworm] - linux 6.1.76-1
-CVE-2024-1085
- [bookworm] - linux 6.1.76-1
-CVE-2024-1086
- [bookworm] - linux 6.1.76-1
-CVE-2024-22705
- [bookworm] - linux 6.1.76-1
-CVE-2024-23849
- [bookworm] - linux 6.1.76-1
-CVE-2023-46837
- [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1
-CVE-2023-46840
- [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1
-CVE-2023-46839
- [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1
CVE-2023-37378
[bookworm] - nsis 3.08-3+deb12u1
CVE-2023-3153

© 2014-2024 Faster IT GmbH | imprint | privacy policy