Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
a302c90e by security tracker role at 2024-02-23T20:12:17+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,86 +1,158 @@
-CVE-2024-26597 [net: qualcomm: rmnet: fix global oob in rmnet_policy]
+CVE-2024-27319 (Versions of the package onnx before and including 1.15.0 are
vulnerabl ...)
+ TODO: check
+CVE-2024-27318 (Versions of the package onnx before and including 1.15.0 are
vulnerabl ...)
+ TODO: check
+CVE-2024-26150 (`@backstage/backend-common` is a common functionality library
for back ...)
+ TODO: check
+CVE-2024-25928 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2024-25915 (Server-Side Request Forgery (SSRF) vulnerability in Raaj
Trambadia Pex ...)
+ TODO: check
+CVE-2024-25629 (c-ares is a C library for asynchronous DNS requests.
`ares__read_line( ...)
+ TODO: check
+CVE-2024-23320 (Improper Input Validation vulnerability in Apache
DolphinScheduler. An ...)
+ TODO: check
+CVE-2024-22776 (Wallos 0.9 is vulnerable to Cross Site Scripting (XSS) in all
text-bas ...)
+ TODO: check
+CVE-2024-1834 (A vulnerability was found in SourceCodester Simple Student
Attendance ...)
+ TODO: check
+CVE-2024-1833 (A vulnerability was found in SourceCodester Employee Management
System ...)
+ TODO: check
+CVE-2024-1832 (A vulnerability has been found in SourceCodester Complete File
Managem ...)
+ TODO: check
+CVE-2024-1831 (A vulnerability, which was classified as critical, was found in
Source ...)
+ TODO: check
+CVE-2024-1830 (A vulnerability was found in code-projects Library System 1.0.
It has ...)
+ TODO: check
+CVE-2024-1829 (A vulnerability was found in code-projects Library System 1.0.
It has ...)
+ TODO: check
+CVE-2024-1828 (A vulnerability was found in code-projects Library System 1.0.
It has ...)
+ TODO: check
+CVE-2024-1827 (A vulnerability was found in code-projects Library System 1.0
and clas ...)
+ TODO: check
+CVE-2024-1826 (A vulnerability has been found in code-projects Library System
1.0 and ...)
+ TODO: check
+CVE-2024-1825 (A vulnerability, which was classified as problematic, was found
in Cod ...)
+ TODO: check
+CVE-2024-1824 (A vulnerability, which was classified as critical, has been
found in C ...)
+ TODO: check
+CVE-2024-1823 (A vulnerability classified as critical was found in CodeAstro
Simple V ...)
+ TODO: check
+CVE-2024-1822 (A vulnerability classified as problematic has been found in
PHPGurukul ...)
+ TODO: check
+CVE-2024-1821 (A vulnerability was found in code-projects Crime Reporting
System 1.0. ...)
+ TODO: check
+CVE-2024-1820 (A vulnerability was found in code-projects Crime Reporting
System 1.0. ...)
+ TODO: check
+CVE-2024-1819 (A vulnerability was found in CodeAstro Membership Management
System 1. ...)
+ TODO: check
+CVE-2024-1818 (A vulnerability was found in CodeAstro Membership Management
System 1. ...)
+ TODO: check
+CVE-2024-1817 (A vulnerability has been found in Demososo DM Enterprise
Website Build ...)
+ TODO: check
+CVE-2024-1590 (The Page Builder: Pagelayer \u2013 Drag and Drop website
builder plugi ...)
+ TODO: check
+CVE-2024-1362 (The Colibri Page Builder plugin for WordPress is vulnerable to
Cross-S ...)
+ TODO: check
+CVE-2024-1361 (The Colibri Page Builder plugin for WordPress is vulnerable to
Cross-S ...)
+ TODO: check
+CVE-2024-1360 (The Colibri WP theme for WordPress is vulnerable to Cross-Site
Request ...)
+ TODO: check
+CVE-2024-0563 (Denial of service condition in M-Files Server inversions before
24.2 ( ...)
+ TODO: check
+CVE-2023-52457 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2023-51394 (High traffic environments may result in NULL Pointer
Dereference vulne ...)
+ TODO: check
+CVE-2023-51393 (Due to an allocation of resources without limits, an
uncontrolled reso ...)
+ TODO: check
+CVE-2023-51392 (Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM
instead of ...)
+ TODO: check
+CVE-2023-4826 (The SocialDriver WordPress theme before version 2024 has a
prototype p ...)
+ TODO: check
+CVE-2024-26597 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux 5.10.209-1
NOTE:
https://git.kernel.org/linus/b33fb5b801c6db408b774a68e7c8722796b59ecc (6.8-rc1)
-CVE-2023-52464 [EDAC/thunderx: Fix possible out-of-bounds string access]
+CVE-2023-52464 (In the Linux kernel, the following vulnerability has been
resolved: E ...)
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux 5.10.209-1
NOTE:
https://git.kernel.org/linus/475c58e1a471e9b873e3e39958c64a2d278275c8 (6.8-rc1)
-CVE-2023-52463 [efivarfs: force RO when remounting if SetVariable is not
supported]
+CVE-2023-52463 (In the Linux kernel, the following vulnerability has been
resolved: e ...)
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux 5.10.209-1
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/0e8d2444168dd519fea501599d150e62718ed2fe (6.8-rc1)
-CVE-2023-52459 [media: v4l: async: Fix duplicated list deletion]
+CVE-2023-52459 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
- linux 6.6.15-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/3de6ee94aae701fa949cd3b5df6b6a440ddfb8f2 (6.8-rc1)
-CVE-2024-26599 [pwm: Fix out-of-bounds access in of_pwm_single_xlate()]
+CVE-2024-26599 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/a297d07b9a1e4fb8cda25a4a2363a507d294b7c9 (6.8-rc1)
-CVE-2024-26598 [KVM: arm64: vgic-its: Avoid potential UAF in LPI translation
cache]
+CVE-2024-26598 (In the Linux kernel, the following vulnerability has been
resolved: K ...)
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux 5.10.209-1
NOTE:
https://git.kernel.org/linus/ad362fe07fecf0aba839ff2cc59a3617bd42c33f (6.8-rc1)
-CVE-2024-26596 [net: dsa: fix netdev_priv() dereference before check on
non-DSA netdevice events]
+CVE-2024-26596 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/844f104790bd69c2e4dbb9ee3eba46fde1fcea7b (6.8-rc1)
-CVE-2024-26595 [mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in
error path]
+CVE-2024-26595 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
- linux 6.6.15-1
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809 (6.8-rc1)
-CVE-2023-52461 [drm/sched: Fix bounds limiting when given a malformed entity]
+CVE-2023-52461 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
- linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/2bbe6ab2be53858507f11f99f856846d04765ae3 (6.8-rc1)
-CVE-2023-52462 [bpf: fix check for attempt to corrupt spilled pointer]
+CVE-2023-52462 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux 5.10.209-1
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae (6.8-rc1)
-CVE-2023-52460 [drm/amd/display: Fix NULL pointer dereference at hibernate]
+CVE-2023-52460 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
- linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/b719a9c15d52d4f56bdea8241a5d90fd9197ce99 (6.8-rc1)
-CVE-2023-52458 [block: add check that partition length needs to be aligned
with block size]
+CVE-2023-52458 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
NOTE:
https://git.kernel.org/linus/6f64f866aa1ae6975c95d805ed51d7e9433a0016 (6.8-rc1)
-CVE-2023-52456 [serial: imx: fix tx statemachine deadlock]
+CVE-2023-52456 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux 5.10.209-1
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0 (6.8-rc1)
-CVE-2023-52455 [iommu: Don't reserve 0-length IOVA region]
+CVE-2023-52455 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
- linux 6.6.15-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/bb57f6705960bebeb832142ce9abf43220c3eab1 (6.8-rc1)
-CVE-2023-52454 [nvmet-tcp: Fix a kernel panic when host sends an invalid H2C
PDU length]
+CVE-2023-52454 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux 5.10.209-1
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/efa56305908ba20de2104f1b8508c6a7401833be (6.8-rc1)
-CVE-2023-52453 [hisi_acc_vfio_pci: Update migration data pointer correctly on
saving/resume]
+CVE-2023-52453 (In the Linux kernel, the following vulnerability has been
resolved: h ...)
- linux 6.6.15-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/be12ad45e15b5ee0e2526a50266ba1d295d26a88 (6.8-rc1)
-CVE-2024-26594 [ksmbd: validate mech token in session setup]
+CVE-2024-26594 (In the Linux kernel, the following vulnerability has been
resolved: k ...)
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -91,7 +163,7 @@ CVE-2024-22025
NOTE: https://nodejs.org/en/blog/release/v18.19.1
NOTE:
https://github.com/nodejs/node/commit/f31d47e135973746c4f490d5eb635eded8bb3dda
(v18.x)
NOTE:
https://github.com/nodejs/node/commit/9052ef43dc2d1b0db340591a9bc9e45a25c01d90
(main)
-CVE-2024-26593 [i2c: i801: Fix block process call transactions]
+CVE-2024-26593 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
- linux <unfixed>
NOTE:
https://git.kernel.org/linus/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21 (6.8-rc5)
CVE-2024-23807
@@ -885,7 +957,7 @@ CVE-2024-1554 (The `fetch()` API and navigation incorrectly
shared the same cach
- firefox 123.0-1
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-05/#CVE-2024-1554
CVE-2024-1553 (Memory safety bugs present in Firefox 122, Firefox ESR 115.7,
and Thun ...)
- {DSA-5627-1}
+ {DSA-5630-1 DSA-5627-1}
- firefox 123.0-1
- firefox-esr 115.8.0esr-1
- thunderbird 1:115.8.0-1
@@ -893,7 +965,7 @@ CVE-2024-1553 (Memory safety bugs present in Firefox 122,
Firefox ESR 115.7, and
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/#CVE-2024-1553
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-07/#CVE-2024-1553
CVE-2024-1552 (Incorrect code generation could have led to unexpected numeric
convers ...)
- {DSA-5627-1}
+ {DSA-5630-1 DSA-5627-1}
- firefox 123.0-1
- firefox-esr 115.8.0esr-1
- thunderbird 1:115.8.0-1
@@ -901,7 +973,7 @@ CVE-2024-1552 (Incorrect code generation could have led to
unexpected numeric co
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/#CVE-2024-1552
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-07/#CVE-2024-1552
CVE-2024-1551 (Set-Cookie response headers were being incorrectly honored in
multipar ...)
- {DSA-5627-1}
+ {DSA-5630-1 DSA-5627-1}
- firefox 123.0-1
- firefox-esr 115.8.0esr-1
- thunderbird 1:115.8.0-1
@@ -909,7 +981,7 @@ CVE-2024-1551 (Set-Cookie response headers were being
incorrectly honored in mul
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/#CVE-2024-1551
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-07/#CVE-2024-1551
CVE-2024-1550 (A malicious website could have used a combination of exiting
fullscree ...)
- {DSA-5627-1}
+ {DSA-5630-1 DSA-5627-1}
- firefox 123.0-1
- firefox-esr 115.8.0esr-1
- thunderbird 1:115.8.0-1
@@ -917,7 +989,7 @@ CVE-2024-1550 (A malicious website could have used a
combination of exiting full
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/#CVE-2024-1550
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-07/#CVE-2024-1550
CVE-2024-1549 (If a website set a large custom cursor, portions of the cursor
could h ...)
- {DSA-5627-1}
+ {DSA-5630-1 DSA-5627-1}
- firefox 123.0-1
- firefox-esr 115.8.0esr-1
- thunderbird 1:115.8.0-1
@@ -925,7 +997,7 @@ CVE-2024-1549 (If a website set a large custom cursor,
portions of the cursor co
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/#CVE-2024-1549
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-07/#CVE-2024-1549
CVE-2024-1548 (A website could have obscured the fullscreen notification by
using a d ...)
- {DSA-5627-1}
+ {DSA-5630-1 DSA-5627-1}
- firefox 123.0-1
- firefox-esr 115.8.0esr-1
- thunderbird 1:115.8.0-1
@@ -933,7 +1005,7 @@ CVE-2024-1548 (A website could have obscured the
fullscreen notification by usin
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/#CVE-2024-1548
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-07/#CVE-2024-1548
CVE-2024-1547 (Through a series of API calls and redirects, an
attacker-controlled al ...)
- {DSA-5627-1}
+ {DSA-5630-1 DSA-5627-1}
- firefox 123.0-1
- firefox-esr 115.8.0esr-1
- thunderbird 1:115.8.0-1
@@ -941,7 +1013,7 @@ CVE-2024-1547 (Through a series of API calls and
redirects, an attacker-controll
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/#CVE-2024-1547
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-07/#CVE-2024-1547
CVE-2024-1546 (When storing and re-accessing data on a networking channel, the
length ...)
- {DSA-5627-1}
+ {DSA-5630-1 DSA-5627-1}
- firefox 123.0-1
- firefox-esr 115.8.0esr-1
- thunderbird 1:115.8.0-1
@@ -5231,7 +5303,8 @@ CVE-2023-7225 (The MapPress Maps for WordPress plugin for
WordPress is vulnerabl
NOT-FOR-US: WordPress plugin
CVE-2023-5372 (The post-authentication command injection vulnerability in
Zyxel NAS32 ...)
NOT-FOR-US: Zyxel
-CVE-2023-52071 (tiny-curl-8_4_0 , curl-8_4_0 and curl-8_5_0 were discovered to
contain ...)
+CVE-2023-52071
+ REJECTED
- curl 8.4.0-1 (unimportant)
[bookworm] - curl <not-affected> (Vulnerable code not present)
[bullseye] - curl <not-affected> (Vulnerable code not present)
@@ -12609,7 +12682,7 @@ CVE-2023-50272 (A potential security vulnerability has
been identified in HPE In
NOT-FOR-US: HPE
CVE-2023-49706 (Defective request context handling in Self Service in LinOTP
3.x befor ...)
NOT-FOR-US: LinOTP
-CVE-2023-49489 (Reflective Cross Site Scripting (XSS) vulnerability in
KodeExplorer ve ...)
+CVE-2023-49489 (Reflective Cross Site Scripting (XSS) vulnerability in
KodExplorer ver ...)
NOT-FOR-US: kalcaddle KodExplorer
CVE-2023-49006 (Cross Site Request Forgery (CSRF) vulnerability in Phpsysinfo
version ...)
- phpsysinfo 3.4.3-1
@@ -67311,8 +67384,8 @@ CVE-2023-24418 (Auth. (admin+) Stored Cross-Site
Scripting (XSS) vulnerability i
NOT-FOR-US: WordPress plugin
CVE-2023-24417 (Cross-Site Request Forgery (CSRF) vulnerability in
tiggersWelt.Net Wor ...)
NOT-FOR-US: WordPress plugin
-CVE-2023-24416
- RESERVED
+CVE-2023-24416 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
CVE-2023-24415 (Cross-Site Request Forgery (CSRF) vulnerability in
QuantumCloud AI Cha ...)
NOT-FOR-US: WordPress plugin
CVE-2023-24414 (Cross-Site Request Forgery (CSRF) vulnerability in RoboSoft
Photo Gall ...)
@@ -91270,8 +91343,8 @@ CVE-2022-43844 (IBM Robotic Process Automation for
Cloud Pak 20.12 through 21.0.
NOT-FOR-US: IBM
CVE-2022-43843 (IBM Spectrum Scale 5.1.5.0 through 5.1.5.1 uses weaker than
expected c ...)
NOT-FOR-US: IBM
-CVE-2022-43842
- RESERVED
+CVE-2022-43842 (IBM Aspera Console 3.4.0 through 3.4.2 is vulnerable to SQL
injection. ...)
+ TODO: check
CVE-2022-43841
RESERVED
CVE-2022-43840
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a302c90e96d400ccd53f43c546d776c01944cc44
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a302c90e96d400ccd53f43c546d776c01944cc44
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits