From 7a3afca05854f9fad10d7bed9730fbb430b584dd Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Tue, 6 Feb 2024 22:01:38 +0100 Subject: Merge linux changes for bookworm 12.5 --- data/CVE/list | 12 ++++++++++++ data/next-point-update.txt | 24 ------------------------ 2 files changed, 12 insertions(+), 24 deletions(-) (limited to 'data') diff --git a/data/CVE/list b/data/CVE/list index 5d768634f8..e4ccae8df6 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -1184,10 +1184,12 @@ CVE-2024-1087 REJECTED CVE-2024-1086 (A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...) - linux 6.6.15-1 + [bookworm] - linux 6.1.76-1 NOTE: https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660 NOTE: https://git.kernel.org/linus/f342de4e2f33e0e39165d8639387aa6c19dff660 (6.8-rc2) CVE-2024-1085 (A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...) - linux 6.6.15-1 + [bookworm] - linux 6.1.76-1 [bullseye] - linux (Vulnerable code not present) [buster] - linux (Vulnerable code not present) NOTE: https://kernel.dance/b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7 @@ -1670,6 +1672,7 @@ CVE-2024-0986 (A vulnerability was found in Issabel PBX 4.0.0. It has been rated NOT-FOR-US: Issabel PBX CVE-2023-52340 [ipv6: remove max_size check inline with ipv4] - linux 6.3.7-1 + [bookworm] - linux 6.1.76-1 NOTE: https://git.kernel.org/linus/af6d10345ca76670c1b7c37799f0d5576ccef277 (6.3-rc1) CVE-2024-0841 (A null pointer dereference flaw was found in the hugetlbfs_fill_super ...) - linux @@ -2572,6 +2575,7 @@ CVE-2024-23850 (In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel NOTE: https://lore.kernel.org/all/6a80cb4b32af89787dadee728310e5e2ca85343f.1705741883.git.wqu%40suse.com/ CVE-2024-23849 (In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel thro ...) - linux 6.6.15-1 + [bookworm] - linux 6.1.76-1 NOTE: https://lore.kernel.org/netdev/1705715319-19199-1-git-send-email-sharath.srinivasan%40oracle.com/ CVE-2024-23848 (In the Linux kernel through 6.7.1, there is a use-after-free in cec_qu ...) - linux @@ -2594,6 +2598,7 @@ CVE-2024-23180 (Improper input validation vulnerability in a-blog cms Ver.3.1.x NOT-FOR-US: a-blog cms CVE-2024-22705 (An issue was discovered in ksmbd in the Linux kernel before 6.6.10. sm ...) - linux 6.6.11-1 + [bookworm] - linux 6.1.76-1 [bullseye] - linux (Vulnerable code not present) [buster] - linux (Vulnerable code not present) NOTE: https://git.kernel.org/linus/d10c77873ba1e9e6b91905018e29e196fd5f863d (6.7-rc8) @@ -2934,6 +2939,7 @@ CVE-2023-46839 [pci: phantom functions assigned to incorrect contexts] NOTE: https://xenbits.xen.org/xsa/advisory-449.html CVE-2023-46838 (Transmit requests in Xen's virtual network protocol can consist of mul ...) - linux 6.6.15-1 + [bookworm] - linux 6.1.76-1 NOTE: https://xenbits.xen.org/xsa/advisory-448.html NOTE: https://git.kernel.org/linus/c7ec4f2d684e17d69bbdd7c4324db0ef5daac26a CVE-2024-23771 (darkhttpd before 1.15 uses strcmp (which is not constant time) to veri ...) @@ -4221,6 +4227,7 @@ CVE-2023-6941 (The Keap Official Opt-in Forms WordPress plugin through 1.0.11 do NOT-FOR-US: WordPress plugin CVE-2023-6915 (A Null pointer dereference problem was found in ida_free in lib/idr.c ...) - linux 6.6.13-1 + [bookworm] - linux 6.1.76-1 NOTE: https://git.kernel.org/linus/af73483f4e8b6f5c68c9aa63257bdd929a9c194a (6.7-rc7) CVE-2023-6843 (The easy.jobs- Best Recruitment Plugin for Job Board Listing, Manager, ...) NOT-FOR-US: WordPress plugin @@ -11257,6 +11264,7 @@ CVE-2023-6646 (A vulnerability classified as problematic has been found in linkd NOT-FOR-US: linkding CVE-2023-50431 (sec_attest_info in drivers/accel/habanalabs/common/habanalabs_ioctl.c ...) - linux 6.6.15-1 + [bookworm] - linux 6.1.76-1 [bullseye] - linux (Vulnerable code not present) [buster] - linux (Vulnerable code not present) NOTE: https://lists.freedesktop.org/archives/dri-devel/2023-November/431772.html @@ -11327,6 +11335,7 @@ CVE-2023-6611 (A vulnerability was found in Tongda OA 2017 up to 11.9. It has be NOT-FOR-US: Tongda OA CVE-2023-6610 (An out-of-bounds read vulnerability was found in smb2_dump_detail in f ...) - linux 6.6.13-1 (unimportant) + [bookworm] - linux 6.1.76-1 NOTE: CONFIG_CIFS_DEBUG2 not enabled in Debian NOTE: https://git.kernel.org/linus/567320c46a60a3c39b69aa1df802d753817a3f86 CVE-2023-6609 (A vulnerability was found in osCommerce 4. It has been classified as p ...) @@ -11338,6 +11347,7 @@ CVE-2023-6607 (A vulnerability has been found in Tongda OA 2017 up to 11.10 and CVE-2023-6606 (An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb ...) {DLA-3710-1} - linux 6.6.9-1 + [bookworm] - linux 6.1.76-1 NOTE: https://bugzilla.kernel.org/show_bug.cgi?id=218218 NOTE: https://git.kernel.org/linus/b35858b3786ddbb56e1c35138ba25d6adf8d0bef CVE-2023-6507 (An issue was found in CPython 3.12.0 `subprocess` module on POSIX plat ...) @@ -19179,6 +19189,7 @@ CVE-2023-33517 (carRental 1.0 is vulnerable to Incorrect Access Control (Arbitra NOT-FOR-US: carRental CVE-2023-5633 (The reference count changes made as part of the CVE-2023-33951 and CVE ...) - linux 6.5.8-1 + [bookworm] - linux 6.1.76-1 [bullseye] - linux (Vulnerable code not present) [buster] - linux (Vulnerable code not present) NOTE: https://git.kernel.org/linus/91398b413d03660fd5828f7b4abc64e884b98069 (6.6-rc6) @@ -53298,6 +53309,7 @@ CVE-2023-1194 (An out-of-bounds (OOB) memory read flaw was found in parse_lease_ NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2154176 CVE-2023-1193 (A use-after-free flaw was found in setup_async_work in the KSMBD imple ...) - linux 6.3.7-1 + [bookworm] - linux 6.1.76-1 [bullseye] - linux (Vulnerable code not present) [buster] - linux (Vulnerable code not present) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2154177 diff --git a/data/next-point-update.txt b/data/next-point-update.txt index e20ab14aaa..87c3d7b3c4 100644 --- a/data/next-point-update.txt +++ b/data/next-point-update.txt @@ -68,30 +68,6 @@ CVE-2023-6683 [bookworm] - qemu 1:7.2+dfsg-7+deb12u4 CVE-2024-0911 [bookworm] - indent 2.2.12-4+deb12u3 -CVE-2023-1193 - [bookworm] - linux 6.1.76-1 -CVE-2023-46838 - [bookworm] - linux 6.1.76-1 -CVE-2023-50431 - [bookworm] - linux 6.1.76-1 -CVE-2023-52340 - [bookworm] - linux 6.1.76-1 -CVE-2023-5633 - [bookworm] - linux 6.1.76-1 -CVE-2023-6606 - [bookworm] - linux 6.1.76-1 -CVE-2023-6610 - [bookworm] - linux 6.1.76-1 -CVE-2023-6915 - [bookworm] - linux 6.1.76-1 -CVE-2024-1085 - [bookworm] - linux 6.1.76-1 -CVE-2024-1086 - [bookworm] - linux 6.1.76-1 -CVE-2024-22705 - [bookworm] - linux 6.1.76-1 -CVE-2024-23849 - [bookworm] - linux 6.1.76-1 CVE-2023-46837 [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1 CVE-2023-46840 -- cgit v1.2.3 From e0dcd7c0360e2955934e44a96d11a6ff337ddbde Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Tue, 6 Feb 2024 22:04:12 +0100 Subject: Merge changes for updates with CVEs via bookworm 12.5 --- data/CVE/list | 74 ++++++++++++++++++++++---------------------- data/next-point-update.txt | 76 ---------------------------------------------- 2 files changed, 38 insertions(+), 112 deletions(-) (limited to 'data') diff --git a/data/CVE/list b/data/CVE/list index e4ccae8df6..939d04990a 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -2079,6 +2079,7 @@ CVE-2024-0914 (A timing side-channel vulnerability has been discovered in the op NOTE: https://people.redhat.com/~hkario/marvin/ CVE-2024-0911 - indent 2.2.13-4 (unimportant; bug #1061543) + [bookworm] - indent 2.2.12-4+deb12u3 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2259883 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2260399 NOTE: https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00001.html @@ -2927,13 +2928,13 @@ CVE-2020-36771 (CloudLinux CageFS 7.1.1-1 or below passes the authentication to NOT-FOR-US: CloudLinux CageFS CVE-2023-46840 [VT-d: Failure to quarantine devices in !HVM builds] - xen 4.17.3+10-g091466ba55-1 - [bookworm] - xen (Fix along in next update) + [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1 [bullseye] - xen (Vulnerable code not present) [buster] - xen (Vulnerable code not present) NOTE: https://xenbits.xen.org/xsa/advisory-450.html CVE-2023-46839 [pci: phantom functions assigned to incorrect contexts] - xen 4.17.3+10-g091466ba55-1 - [bookworm] - xen (Fix along in next update) + [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1 [bullseye] - xen (EOLed in Bullseye) [buster] - xen (DSA 4677-1) NOTE: https://xenbits.xen.org/xsa/advisory-449.html @@ -3406,7 +3407,7 @@ CVE-2023-31274 (AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain CVE-2024-23525 (The Spreadsheet::ParseXLSX package before 0.30 for Perl allows XXE att ...) {DLA-3723-1} - libspreadsheet-parsexlsx-perl 0.31-1 (bug #1061098) - [bookworm] - libspreadsheet-parsexlsx-perl (Slight minor issue; will be fixed in point release) + [bookworm] - libspreadsheet-parsexlsx-perl 0.27-3+deb12u2 [bullseye] - libspreadsheet-parsexlsx-perl (Slight minor issue; will be fixed in point release) NOTE: https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a NOTE: https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10 @@ -3870,7 +3871,7 @@ CVE-2024-0569 (A vulnerability classified as problematic has been found in Totol NOT-FOR-US: Totolink CVE-2024-0567 (A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTL ...) - gnutls28 3.8.3-1 (bug #1061045) - [bookworm] - gnutls28 (Minor issue) + [bookworm] - gnutls28 3.7.9-2+deb12u2 [bullseye] - gnutls28 (Minor issue) [buster] - gnutls28 (Minor issue) NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1521 @@ -3885,7 +3886,7 @@ CVE-2024-0554 (A Cross-site scripting (XSS) vulnerability has been found on WIC1 NOT-FOR-US: WIC200 CVE-2024-0553 (A vulnerability was found in GnuTLS. The response times to malformed c ...) - gnutls28 3.8.3-1 (bug #1061046) - [bookworm] - gnutls28 (Minor issue) + [bookworm] - gnutls28 3.7.9-2+deb12u2 [bullseye] - gnutls28 (Incomplete fix for CVE-2023-5981 not published officially in any Debian bullseye release) NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1522 NOTE: https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-14 @@ -4459,7 +4460,7 @@ CVE-2023-51804 (An issue in rymcu forest v.0.02 allows a remote attacker to obta NOT-FOR-US: rymcu forest CVE-2023-51698 (Atril is a simple multi-page document viewer. Atril is vulnerable to a ...) - atril 1.26.1-4 (bug #1060751) - [bookworm] - atril (Minor issue) + [bookworm] - atril 1.26.0-2+deb12u2 [bullseye] - atril (Minor issue) - evince 3.25.92-1 NOTE: https://github.com/mate-desktop/atril/security/advisories/GHSA-34rr-j8v9-v4p2 @@ -4551,7 +4552,7 @@ CVE-2024-0459 (A vulnerability has been found in Blood Bank & Donor Management 5 NOT-FOR-US: Blood Bank & Donor Management CVE-2023-6683 (A flaw was found in the QEMU built-in VNC server while processing Clie ...) - qemu 1:8.2.0+ds-5 (bug #1060749) - [bookworm] - qemu (Minor issue) + [bookworm] - qemu 1:7.2+dfsg-7+deb12u4 [bullseye] - qemu (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2254825 NOTE: Proposed patch: https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html @@ -4601,7 +4602,7 @@ CVE-2010-10011 (A vulnerability, which was classified as problematic, was found NOT-FOR-US: Acritum Femitter Server CVE-2024-23659 (SPIP before 4.1.14 and 4.2.x before 4.2.8 allows XSS via the name of a ...) - spip 4.1.15+dfsg-1 - [bookworm] - spip (Minor issue) + [bookworm] - spip 4.1.9+dfsg-1+deb12u4 [bullseye] - spip (Vulnerable code not present) [buster] - spip (Vulnerable code not present) NOTE: https://git.spip.net/spip/bigup/commit/ada821c076d67d1147a195178223d0b4a6d8cecc @@ -5459,7 +5460,7 @@ CVE-2024-22370 (In JetBrains YouTrack before 2023.3.22666 stored XSS via markdow CVE-2024-22368 (The Spreadsheet::ParseXLSX package before 0.28 for Perl can encounter ...) {DLA-3723-1} - libspreadsheet-parsexlsx-perl 0.29-1 - [bookworm] - libspreadsheet-parsexlsx-perl (Minor issue; DoS, can be fixed in point release) + [bookworm] - libspreadsheet-parsexlsx-perl 0.27-3+deb12u1 [bullseye] - libspreadsheet-parsexlsx-perl (Minor issue; DoS, can be fixed in point release) NOTE: https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md NOTE: Fixed by: https://github.com/MichaelDaum/spreadsheet-parsexlsx/commit/39b25b91fcb939a9c8ea807fdc80386c1ae5be0c (0.28) @@ -6528,7 +6529,7 @@ CVE-2024-21907 (Newtonsoft.Json before version 13.0.1 is affected by a mishandli NOT-FOR-US: Newtonsoft.Json CVE-2024-21633 (Apktool is a tool for reverse engineering Android APK files. In versio ...) - apktool 2.7.0+dfsg-7 (bug #1060013) - [bookworm] - apktool (Minor issue) + [bookworm] - apktool 2.7.0+dfsg-6+deb12u1 [bullseye] - apktool (Minor issue) [buster] - apktool (Minor issue) NOTE: https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-2hqv-2xv4-5h5w @@ -6833,7 +6834,7 @@ CVE-2015-10128 (A vulnerability was found in rt-prettyphoto Plugin up to 1.2 on NOT-FOR-US: WordPress plugin CVE-2023-6693 (A stack based buffer overflow was found in the virtio-net device of QE ...) - qemu 1:8.2.0+ds-3 - [bookworm] - qemu (Minor issue) + [bookworm] - qemu 1:7.2+dfsg-7+deb12u4 [bullseye] - qemu (Minor issue) [buster] - qemu (Vulnerable code introduced later) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2254580 @@ -7925,7 +7926,7 @@ CVE-2023-51765 (sendmail through 8.17.2 allows SMTP smuggling in certain configu CVE-2023-51764 (Postfix through 3.8.5 allows SMTP smuggling unless configured with smt ...) {DLA-3725-1} - postfix 3.8.4-1 (bug #1059230) - [bookworm] - postfix (Minor issue; mitigations exist) + [bookworm] - postfix 3.7.9-0+deb12u1 [bullseye] - postfix (Minor issue; mitigations exist) NOTE: https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ NOTE: https://www.openwall.com/lists/oss-security/2023/12/21/6 @@ -8146,7 +8147,7 @@ CVE-2023-39251 (Dell BIOS contains an Improper Input Validation vulnerability. A NOT-FOR-US: Dell CVE-2023-52322 (ecrire/public/assembler.php in SPIP before 4.1.13 and 4.2.x before 4.2 ...) - spip 4.1.13+dfsg-1 (bug #1059331) - [bookworm] - spip (Minor issue) + [bookworm] - spip 4.1.9+dfsg-1+deb12u4 [bullseye] - spip (Minor issue) [buster] - spip (Minor issue) NOTE: https://blog.spip.net/Mise-a-jour-de-maintenance-et-securite-sortie-de-SPIP-4-2-7-SPIP-4-1-13.html?lang=fr @@ -8185,7 +8186,7 @@ CVE-2023-6690 (A race condition in GitHub Enterprise Server allowed an existing NOT-FOR-US: GitHub Enterprise Server CVE-2023-51713 (make_ftp_cmd in main.c in ProFTPD before 1.3.8a has a one-byte out-of- ...) - proftpd-dfsg 1.3.8.a+dfsg-1 - [bookworm] - proftpd-dfsg (Minor issue) + [bookworm] - proftpd-dfsg 1.3.8+dfsg-4+deb12u3 [bullseye] - proftpd-dfsg (Minor issue) [buster] - proftpd-dfsg (Minor issue) NOTE: https://github.com/proftpd/proftpd/issues/1683 @@ -8556,7 +8557,7 @@ CVE-2023-7018 (Deserialization of Untrusted Data in GitHub repository huggingfac NOT-FOR-US: Transformers CVE-2023-7008 (A vulnerability was found in systemd-resolved. This issue may allow sy ...) - systemd 255.1-3 (bug #1059278) - [bookworm] - systemd (Minor issue) + [bookworm] - systemd 252.21-1~deb12u1 [bullseye] - systemd (Minor issue) [buster] - systemd (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2222672 @@ -9234,7 +9235,7 @@ CVE-2023-32230 (An improper handling of a malformed API request to an API server CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, found in O ...) {DSA-5601-1 DSA-5600-1 DSA-5599-1 DSA-5591-1 DSA-5588-1 DSA-5586-1 DLA-3730-1 DLA-3719-1 DLA-3718-1 DLA-3694-1} - dropbear 2022.83-4 (bug #1059001) - [bookworm] - dropbear (Minor issue) + [bookworm] - dropbear 2022.83-1+deb12u1 [bullseye] - dropbear (Minor issue) [buster] - dropbear (ChaCha20-Poly1305 support introduced in 2020.79; *-EtM not supported as of 2022.83) - erlang 1:25.3.2.8+dfsg-1 (bug #1059002) @@ -9242,7 +9243,7 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun [bullseye] - erlang (Minor issue) [buster] - erlang (Minor issue) - filezilla 3.66.4-1 - [bookworm] - filezilla (Minor issue) + [bookworm] - filezilla 3.63.0-1+deb12u3 [bullseye] - filezilla (Minor issue) [buster] - filezilla (Minor issue) - golang-go.crypto 1:0.17.0-1 (bug #1059003) @@ -9263,11 +9264,11 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun - php-phpseclib 2.0.46-1 - php-phpseclib3 3.0.35-1 - proftpd-dfsg 1.3.8.b+dfsg-1 (bug #1059144) - [bookworm] - proftpd-dfsg (Minor issue) + [bookworm] - proftpd-dfsg 1.3.8+dfsg-4+deb12u3 [bullseye] - proftpd-dfsg (Minor issue) [buster] - proftpd-dfsg (Minor issue) - proftpd-mod-proxy 0.9.3-1 (bug #1059290) - [bookworm] - proftpd-mod-proxy (Minor issue) + [bookworm] - proftpd-mod-proxy 0.9.2-1+deb12u1 [bullseye] - proftpd-mod-proxy (Minor issue) - putty 0.80-1 - python-asyncssh (bug #1059007) @@ -10645,7 +10646,7 @@ CVE-2023-42495 (Dasan Networks - W-Web versions 1.22-1.27 - CWE-78: Improper Neu CVE-2023-34194 (StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML ...) {DLA-3701-1} - tinyxml 2.6.2-6.1 (bug #1059315) - [bookworm] - tinyxml (Minor issue) + [bookworm] - tinyxml 2.6.2-6+deb12u1 [bullseye] - tinyxml (Minor issue) NOTE: https://www.forescout.com/resources/sierra21-vulnerabilities NOTE: Debian (non upstream) patch: https://salsa.debian.org/debian/tinyxml/-/raw/2366e1f23d059d4c20c43c54176b6bd78d6a83fc/debian/patches/CVE-2023-34194.patch @@ -10864,35 +10865,35 @@ CVE-2023-4932 (SAS application is vulnerable to Reflected Cross-Site Scripting ( NOT-FOR-US: SAS CVE-2023-49994 (Espeak-ng 1.52-dev was discovered to contain a Floating Point Exceptio ...) - espeak-ng 1.51+dfsg-12 (bug #1059060) - [bookworm] - espeak-ng (Minor issue) + [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1 [bullseye] - espeak-ng (Minor issue) [buster] - espeak-ng (Minor issue) NOTE: https://github.com/espeak-ng/espeak-ng/issues/1823 NOTE: https://github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c CVE-2023-49993 (Espeak-ng 1.52-dev was discovered to contain a Buffer Overflow via the ...) - espeak-ng 1.51+dfsg-12 (bug #1059060) - [bookworm] - espeak-ng (Minor issue) + [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1 [bullseye] - espeak-ng (Minor issue) [buster] - espeak-ng (Minor issue) NOTE: https://github.com/espeak-ng/espeak-ng/issues/1826 NOTE: https://github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c CVE-2023-49992 (Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Overflow v ...) - espeak-ng 1.51+dfsg-12 (bug #1059060) - [bookworm] - espeak-ng (Minor issue) + [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1 [bullseye] - espeak-ng (Minor issue) [buster] - espeak-ng (Minor issue) NOTE: https://github.com/espeak-ng/espeak-ng/issues/1827 NOTE: https://github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c CVE-2023-49991 (Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Underflow ...) - espeak-ng 1.51+dfsg-12 (bug #1059060) - [bookworm] - espeak-ng (Minor issue) + [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1 [bullseye] - espeak-ng (Minor issue) [buster] - espeak-ng (Minor issue) NOTE: https://github.com/espeak-ng/espeak-ng/issues/1825 NOTE: https://github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c CVE-2023-49990 (Espeak-ng 1.52-dev was discovered to contain a buffer-overflow via the ...) - espeak-ng 1.51+dfsg-12 (bug #1059060) - [bookworm] - espeak-ng (Minor issue) + [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1 [bullseye] - espeak-ng (Minor issue) [buster] - espeak-ng (Minor issue) NOTE: https://github.com/espeak-ng/espeak-ng/issues/1824 @@ -11152,7 +11153,7 @@ CVE-2023-6356 [NULL pointer dereference in nvmet_tcp_build_iovec] NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2254054 CVE-2023-39804 [Incorrectly handled extension attributes in PAX archives can lead to a crash] - tar 1.34+dfsg-1.3 (bug #1058079) - [bookworm] - tar (Minor issue) + [bookworm] - tar 1.34+dfsg-1.2+deb12u1 [bullseye] - tar (Minor issue) [buster] - tar (Minor issue) NOTE: Fixed by: https://git.savannah.gnu.org/cgit/tar.git/commit/?id=a339f05cd269013fa133d2f148d73f6f7d4247e4 (v1.35) @@ -11546,21 +11547,21 @@ CVE-2023-49492 (DedeCMS v5.7.111 was discovered to contain a reflective cross-si CVE-2023-49468 (Libde265 v1.0.14 was discovered to contain a global buffer overflow vu ...) {DLA-3699-1} - libde265 1.0.15-1 (bug #1059275) - [bookworm] - libde265 (Minor issue) + [bookworm] - libde265 1.0.11-1+deb12u2 [bullseye] - libde265 (Minor issue) NOTE: https://github.com/strukturag/libde265/issues/432 NOTE: Fixed by: https://github.com/strukturag/libde265/commit/3e822a3ccf88df1380b165d6ce5a00494a27ceeb (v1.0.15) CVE-2023-49467 (Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vuln ...) {DLA-3699-1} - libde265 1.0.15-1 (bug #1059275) - [bookworm] - libde265 (Minor issue) + [bookworm] - libde265 1.0.11-1+deb12u2 [bullseye] - libde265 (Minor issue) NOTE: https://github.com/strukturag/libde265/issues/434 NOTE: Fixed by: https://github.com/strukturag/libde265/commit/7e4faf254bbd2e52b0f216cb987573a2cce97b54 (v1.0.15) CVE-2023-49465 (Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vuln ...) {DLA-3699-1} - libde265 1.0.15-1 (bug #1059275) - [bookworm] - libde265 (Minor issue) + [bookworm] - libde265 1.0.11-1+deb12u2 [bullseye] - libde265 (Minor issue) NOTE: https://github.com/strukturag/libde265/issues/435 NOTE: Fixed by: https://github.com/strukturag/libde265/commit/1475c7d2f0a6dc35c27e18abc4db9679bfd32568 (v1.0.15) @@ -12113,7 +12114,7 @@ CVE-2023-49289 (Ajax.NET Professional (AjaxPro) is an AJAX framework for Microso NOT-FOR-US: Ajax.NET Professional CVE-2023-49284 (fish is a smart and user-friendly command line shell for macOS, Linux, ...) - fish 3.6.4-1 (bug #1057455) - [bookworm] - fish (Minor issue) + [bookworm] - fish 3.6.0-3.1+deb12u1 [bullseye] - fish (Minor issue) [buster] - fish (Minor issue) NOTE: https://github.com/fish-shell/fish-shell/security/advisories/GHSA-2j9r-pm96-wp4f @@ -19307,7 +19308,7 @@ CVE-2023-46306 (The web administration interface in NetModule Router Software (N NOT-FOR-US: NetModule Router Software CVE-2023-46303 (link_to_local_path in ebooks/conversion/plugins/html_input.py in calib ...) - calibre 6.19.1-1 - [bookworm] - calibre (Minor issue) + [bookworm] - calibre 6.13.0+repack-2+deb12u3 [bullseye] - calibre (Minor issue) [buster] - calibre (Minor issue) NOTE: https://github.com/0x1717/ssrf-via-img @@ -21884,7 +21885,7 @@ CVE-2023-34324 (Closing of an event channel in the Linux kernel can result in a NOTE: https://git.kernel.org/linus/87797fad6cce28ec9be3c13f031776ff4f104cfc (6.6-rc6) CVE-2023-46837 (Arm provides multiple helpers to clean & invalidate the cache for a gi ...) - xen 4.17.3+10-g091466ba55-1 - [bookworm] - xen (Minor issue, fix along in next DSA) + [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1 [bullseye] - xen (EOLed in Bullseye) [buster] - xen (DSA 4677-1) NOTE: https://xenbits.xen.org/xsa/advisory-447.html @@ -33622,7 +33623,7 @@ CVE-2018-25088 (A vulnerability, which was classified as critical, was found in NOT-FOR-US: Blue Yonder postgraas_server CVE-2023-3724 (If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor ...) - wolfssl 5.5.4-2.1 (bug #1041699) - [bookworm] - wolfssl (Minor issue) + [bookworm] - wolfssl 5.5.4-2+deb12u1 [bullseye] - wolfssl (Minor issue) NOTE: https://github.com/wolfSSL/wolfssl/pull/6412 NOTE: https://github.com/wolfSSL/wolfssl/commit/00f1eddee429ff51390b20caadd2eb6afe51e1aa (v5.6.2-stable) @@ -36481,9 +36482,9 @@ CVE-2023-3327 REJECTED CVE-2023-36464 (pypdf is an open source, pure-python PDF library. In affected versions ...) - pypdf 3.17.4-1 (bug #1040338) - [bookworm] - pypdf (Minor issue) + [bookworm] - pypdf 3.4.1-1+deb12u1 - pypdf2 2.12.1-4 (bug #1040339) - [bookworm] - pypdf2 (Minor issue) + [bookworm] - pypdf2 2.12.1-3+deb12u1 [bullseye] - pypdf2 (Vulnerable code not present) [buster] - pypdf2 (Vulnerable code not present) NOTE: https://github.com/py-pdf/pypdf/security/advisories/GHSA-4vvm-4w3v-6mr8 @@ -62591,6 +62592,7 @@ CVE-2022-48304 RESERVED CVE-2022-48303 (GNU Tar through 1.34 has a one-byte out-of-bounds read that results in ...) - tar 1.34+dfsg-1.4 (unimportant) + [bookworm] - tar 1.34+dfsg-1.2+deb12u1 NOTE: Crash in CLI tool, no security impact NOTE: https://savannah.gnu.org/bugs/?62387 NOTE: https://savannah.gnu.org/patch/?10307 @@ -72742,7 +72744,7 @@ CVE-2023-22085 (Vulnerability in the Hospitality OPERA 5 Property Services produ CVE-2023-22084 (Vulnerability in the MySQL Server product of Oracle MySQL (component: ...) {DLA-3722-1} - mariadb 1:10.11.6-1 - [bookworm] - mariadb (Minor issue, will be fixed via point update) + [bookworm] - mariadb 1:10.11.6-0+deb12u1 - mariadb-10.5 [bullseye] - mariadb-10.5 (Minor issue, will be fixed via point update) - mariadb-10.3 diff --git a/data/next-point-update.txt b/data/next-point-update.txt index 87c3d7b3c4..3f1fca84af 100644 --- a/data/next-point-update.txt +++ b/data/next-point-update.txt @@ -1,79 +1,3 @@ -CVE-2023-3724 - [bookworm] - wolfssl 5.5.4-2+deb12u1 -CVE-2023-22084 - [bookworm] - mariadb 1:10.11.6-0+deb12u1 -CVE-2023-49284 - [bookworm] - fish 3.6.0-3.1+deb12u1 -CVE-2023-52322 - [bookworm] - spip 4.1.9+dfsg-1+deb12u4 -CVE-2024-23659 - [bookworm] - spip 4.1.9+dfsg-1+deb12u4 -CVE-2023-51764 - [bookworm] - postfix 3.7.9-0+deb12u1 -CVE-2023-7008 - [bookworm] - systemd 252.21-1~deb12u1 -CVE-2023-49994 - [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1 -CVE-2023-49993 - [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1 -CVE-2023-49992 - [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1 -CVE-2023-49991 - [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1 -CVE-2023-49990 - [bookworm] - espeak-ng 1.51+dfsg-10+deb12u1 -CVE-2023-48795 - [bookworm] - filezilla 3.63.0-1+deb12u3 -CVE-2023-48795 - [bookworm] - dropbear 2022.83-1+deb12u1 -CVE-2023-49465 - [bookworm] - libde265 1.0.11-1+deb12u2 -CVE-2023-49467 - [bookworm] - libde265 1.0.11-1+deb12u2 -CVE-2023-49468 - [bookworm] - libde265 1.0.11-1+deb12u2 -CVE-2023-48795 - [bookworm] - proftpd-dfsg 1.3.8+dfsg-4+deb12u3 -CVE-2023-51713 - [bookworm] - proftpd-dfsg 1.3.8+dfsg-4+deb12u3 -CVE-2024-21633 - [bookworm] - apktool 2.7.0+dfsg-6+deb12u1 -CVE-2023-46303 - [bookworm] - calibre 6.13.0+repack-2+deb12u3 -CVE-2024-22368 - [bookworm] - libspreadsheet-parsexlsx-perl 0.27-3+deb12u1 -CVE-2024-23525 - [bookworm] - libspreadsheet-parsexlsx-perl 0.27-3+deb12u2 -CVE-2023-48795 - [bookworm] - proftpd-mod-proxy 0.9.2-1+deb12u1 -CVE-2023-36464 - [bookworm] - pypdf 3.4.1-1+deb12u1 -CVE-2023-36464 - [bookworm] - pypdf2 2.12.1-3+deb12u1 -CVE-2022-48303 - [bookworm] - tar 1.34+dfsg-1.2+deb12u1 -CVE-2023-39804 - [bookworm] - tar 1.34+dfsg-1.2+deb12u1 -CVE-2024-0567 - [bookworm] - gnutls28 3.7.9-2+deb12u2 -CVE-2024-0553 - [bookworm] - gnutls28 3.7.9-2+deb12u2 -CVE-2023-34194 - [bookworm] - tinyxml 2.6.2-6+deb12u1 -CVE-2023-51698 - [bookworm] - atril 1.26.0-2+deb12u2 -CVE-2023-6693 - [bookworm] - qemu 1:7.2+dfsg-7+deb12u4 -CVE-2023-6683 - [bookworm] - qemu 1:7.2+dfsg-7+deb12u4 -CVE-2024-0911 - [bookworm] - indent 2.2.12-4+deb12u3 -CVE-2023-46837 - [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1 -CVE-2023-46840 - [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1 -CVE-2023-46839 - [bookworm] - xen 4.17.3+10-g091466ba55-1~deb12u1 CVE-2023-37378 [bookworm] - nsis 3.08-3+deb12u1 CVE-2023-3153 -- cgit v1.2.3