Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7679d9e2 by security tracker role at 2023-07-22T20:12:16+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,27 @@
+CVE-2023-3836 (A vulnerability classified as critical was found in Dahua Smart 
Park M ...)
+       TODO: check
+CVE-2023-3835 (A vulnerability classified as problematic has been found in Bug 
Finder ...)
+       TODO: check
+CVE-2023-3834 (A vulnerability was found in Bug Finder EX-RATE 1.0. It has 
been rated ...)
+       TODO: check
+CVE-2023-3833 (A vulnerability was found in Bug Finder Montage 1.0. It has 
been decla ...)
+       TODO: check
+CVE-2023-3832 (A vulnerability was found in Bug Finder Wedding Wonders 1.0. It 
has be ...)
+       TODO: check
+CVE-2023-3831 (A vulnerability was found in Bug Finder Finounce 1.0 and 
classified as ...)
+       TODO: check
+CVE-2023-3830 (A vulnerability was found in Bug Finder SASS BILLER 1.0. It has 
been r ...)
+       TODO: check
+CVE-2023-3829 (A vulnerability was found in Bug Finder ICOGenie 1.0. It has 
been decl ...)
+       TODO: check
+CVE-2023-3828 (A vulnerability was found in Bug Finder Listplace Directory 
Listing Pl ...)
+       TODO: check
+CVE-2023-3827 (A vulnerability was found in Bug Finder Listplace Directory 
Listing Pl ...)
+       TODO: check
+CVE-2023-38633 (A directory traversal problem in the URL decoder of librsvg 
before 2.5 ...)
+       TODO: check
+CVE-2023-38195 (Datalust Seq before 2023.2.9489 allows insertion of sensitive 
informat ...)
+       TODO: check
 CVE-2023-3826 (A vulnerability has been found in IBOS OA 4.5.5 and classified 
as crit ...)
        NOT-FOR-US: IBOS OA
 CVE-2023-3776 (A use-after-free vulnerability in the Linux kernel's net/sched: 
cls_fw ...)
@@ -189,6 +213,7 @@ CVE-2023-31462 (An issue was discovered in SteelSeries GG 
36.0.0. An attacker ca
 CVE-2023-31461 (Attackers can exploit an open API listener on SteelSeries GG 
36.0.0 to ...)
        NOT-FOR-US: SteelSeries
 CVE-2023-37450 [Processing web content may lead to arbitrary code execution]
+       {DSA-5457-1}
        - webkit2gtk 2.40.4-1
        [buster] - webkit2gtk <end-of-life> (webkit2gtk EOL in buster)
        - wpewebkit 2.40.4-1
@@ -3748,6 +3773,7 @@ CVE-2023-32395 (A logic issue was addressed with improved 
state management. This
 CVE-2023-32394 (The issue was addressed with improved checks. This issue is 
fixed in i ...)
        NOT-FOR-US: Apple
 CVE-2023-32393 [Processing web content may lead to arbitrary code execution]
+       {DSA-5396-1}
        - webkit2gtk 2.40.0-1
        [buster] - webkit2gtk <end-of-life> (webkit2gtk EOL in buster)
        - wpewebkit 2.40.2-2
@@ -5385,7 +5411,7 @@ CVE-2020-36728 (The Adning Advertising plugin for 
WordPress is vulnerable to fil
        NOT-FOR-US: Adning Advertising plugin for WordPress
 CVE-2020-36705 (The Adning Advertising plugin for WordPress is vulnerable to 
arbitrary ...)
        NOT-FOR-US: Adning Advertising plugin for WordPress
-CVE-2023-33865 (RenderDoc through 1.26 allows local privilege escalation via a 
symlink ...)
+CVE-2023-33865 (RenderDoc before 1.27 allows local privilege escalation via a 
symlink  ...)
        - renderdoc <unfixed> (bug #1037208)
        [buster] - renderdoc <postponed> (Can wait for next update)
        NOTE: https://www.openwall.com/lists/oss-security/2023/06/06/3
@@ -5394,7 +5420,7 @@ CVE-2023-33865 (RenderDoc through 1.26 allows local 
privilege escalation via a s
        NOTE: 
https://github.com/baldurk/renderdoc/commit/1f72a09e3b4fd8ba45be4b0db4889444ef5179e2
 (v1.27)
        NOTE: 
https://github.com/baldurk/renderdoc/commit/203fc8382a79d53d2035613d9425d966b1d4958e
 (v1.27)
        NOTE: 
https://github.com/baldurk/renderdoc/commit/771aa8e769b72e6a36b31d6e2116db9952dcbe9b
 (v1.27)
-CVE-2023-33864 (RenderDoc through 1.26 allows an Integer Overflow with a 
resultant Buf ...)
+CVE-2023-33864 (StreamReader::ReadFromExternal in RenderDoc before 1.27 allows 
an Inte ...)
        - renderdoc <unfixed> (bug #1037208)
        NOTE: https://www.openwall.com/lists/oss-security/2023/06/06/3
        NOTE: 
https://github.com/baldurk/renderdoc/commit/601ed56111ce3803d8476d438ade1c92d6092856
 (v1.27)
@@ -5402,7 +5428,7 @@ CVE-2023-33864 (RenderDoc through 1.26 allows an Integer 
Overflow with a resulta
        NOTE: 
https://github.com/baldurk/renderdoc/commit/1f72a09e3b4fd8ba45be4b0db4889444ef5179e2
 (v1.27)
        NOTE: 
https://github.com/baldurk/renderdoc/commit/203fc8382a79d53d2035613d9425d966b1d4958e
 (v1.27)
        NOTE: 
https://github.com/baldurk/renderdoc/commit/771aa8e769b72e6a36b31d6e2116db9952dcbe9b
 (v1.27)
-CVE-2023-33863 (RenderDoc through 1.26 allows an Integer Overflow with a 
resultant Buf ...)
+CVE-2023-33863 (SerialiseValue in RenderDoc before 1.27 allows an Integer 
Overflow wit ...)
        - renderdoc <unfixed> (bug #1037208)
        NOTE: https://www.openwall.com/lists/oss-security/2023/06/06/3
        NOTE: 
https://github.com/baldurk/renderdoc/commit/601ed56111ce3803d8476d438ade1c92d6092856
 (v1.27)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7679d9e28d39d71d68623c7769bd5d6f8e1503a4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7679d9e28d39d71d68623c7769bd5d6f8e1503a4
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to