Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
428e67d0 by Moritz Muehlenhoff at 2024-02-28T15:49:06+01:00
bugnums

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -546,7 +546,7 @@ CVE-2024-26471 (A reflected cross-site scripting (XSS) 
vulnerability in zhimengz
 CVE-2024-26470 (A host header injection vulnerability in the forgot password 
function  ...)
        NOT-FOR-US: FullStackHero's WebAPI Boilerplate
 CVE-2024-26464 (net-snmp 5.9.4 contains a memory leak vulnerability in 
/net-snmp/apps/ ...)
-       - net-snmp <unfixed>
+       - net-snmp <unfixed> (bug #1064968)
        NOTE: 
https://github.com/LuMingYinDetect/net-snmp_defects/blob/main/net-snmp_detect_1.md
 CVE-2024-26143 (Rails is a web-application framework. There is a possible XSS 
vulnerab ...)
        - rails <not-affected> (Vulnerable code not present)
@@ -578,7 +578,7 @@ CVE-2024-24323 (SQL injection vulnerability in linlinjava 
litemall v.1.8.0 allow
 CVE-2024-22251 (VMware Workstation and Fusion contain an out-of-bounds read 
vulnerabil ...)
        NOT-FOR-US: VMware
 CVE-2024-21742 (Improper input validation allows for header injection in 
MIME4J librar ...)
-       - apache-mime4j <unfixed>
+       - apache-mime4j <unfixed> (bug #1064966)
        [bookworm] - apache-mime4j <no-dsa> (Minor issue)
        [bullseye] - apache-mime4j <no-dsa> (Minor issue)
        NOTE: https://www.openwall.com/lists/oss-security/2024/02/27/5
@@ -906,17 +906,14 @@ CVE-2024-26466 (A DOM based cross-site scripting (XSS) 
vulnerability in the comp
 CVE-2024-26465 (A DOM based cross-site scripting (XSS) vulnerability in the 
component  ...)
        NOT-FOR-US: beep.js
 CVE-2024-26462 (Kerberos 5 (aka krb5) 1.21.2 contains a memory leak 
vulnerability in / ...)
-       - krb5 <unfixed>
+       - krb5 <unfixed> (bug #1064965)
        NOTE: 
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
-       TODO: check, unclear upstream report status
 CVE-2024-26461 (Kerberos 5 (aka krb5) 1.21.2 contains a memory leak 
vulnerability in / ...)
-       - krb5 <unfixed>
+       - krb5 <unfixed> (bug #1064965)
        NOTE: 
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
-       TODO: check, unclear upstream report status
 CVE-2024-26458 (Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in 
/krb5/src/lib/r ...)
-       - krb5 <unfixed>
+       - krb5 <unfixed> (bug #1064965)
        NOTE: 
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
-       NOTE: check, unclear upstream report status
 CVE-2024-26455 (fluent-bit 2.2.2 contains a Use-After-Free vulnerability in 
/fluent-bi ...)
        NOT-FOR-US: Fluent Bit
 CVE-2024-25925 (Unrestricted Upload of File with Dangerous Type vulnerability 
in SYSBA ...)
@@ -945,11 +942,11 @@ CVE-2024-25410 (flusity-CMS 2.33 is vulnerable to 
Unrestricted Upload of File wi
 CVE-2024-25344 (Cross Site Scripting vulnerability in ITFlow.org before commit 
v.43248 ...)
        NOT-FOR-US: ITFlow.org
 CVE-2024-25082 (Splinefont in FontForge through 20230101 allows command 
injection via  ...)
-       - fontforge <unfixed>
+       - fontforge <unfixed> (bug #1064967)
        NOTE: https://github.com/fontforge/fontforge/pull/5367
        NOTE: 
https://github.com/fontforge/fontforge/commit/216eb14b558df344b206bf82e2bdaf03a1f2f429
 CVE-2024-25081 (Splinefont in FontForge through 20230101 allows command 
injection via  ...)
-       - fontforge <unfixed>
+       - fontforge <unfixed> (bug #1064967)
        NOTE: https://github.com/fontforge/fontforge/pull/5367
        NOTE: 
https://github.com/fontforge/fontforge/commit/216eb14b558df344b206bf82e2bdaf03a1f2f429
 CVE-2024-24714 (Unrestricted Upload of File with Dangerous Type vulnerability 
in bPlug ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/428e67d081211dac256fed6c3f20f773242bf585

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/428e67d081211dac256fed6c3f20f773242bf585
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to