Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
71bb9f02 by security tracker role at 2024-03-04T20:11:52+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,129 +1,215 @@
-CVE-2021-47108 [drm/mediatek: hdmi: Perform NULL pointer check for 
mtk_hdmi_conf]
+CVE-2024-2167
+       REJECTED
+CVE-2024-2048 (Vault and Vault Enterprise (\u201cVault\u201d) TLS certificate 
auth me ...)
+       TODO: check
+CVE-2024-27889 (Multiple SQL Injection vulnerabilities exist in the reporting 
applicat ...)
+       TODO: check
+CVE-2024-27694 (FlyCms v1.0 was discovered to contain a Cross-Site Request 
Forgery (CS ...)
+       TODO: check
+CVE-2024-27684 (A Cross-site scripting (XSS) vulnerability in dlapn.cgi, 
dldongle.cgi, ...)
+       TODO: check
+CVE-2024-27680 (Flusity-CMS v2.33 is vulnerable to Cross Site Scripting (XSS) 
in the " ...)
+       TODO: check
+CVE-2024-27668 (Flusity-CMS v2.33 is affected by: Cross Site Scripting (XSS) 
in 'Custo ...)
+       TODO: check
+CVE-2024-27199 (In JetBrains TeamCity before 2023.11.4 path traversal allowing 
to perf ...)
+       TODO: check
+CVE-2024-27198 (In JetBrains TeamCity before 2023.11.4 authentication bypass 
allowing  ...)
+       TODO: check
+CVE-2024-24901 (Dell PowerScale OneFS 8.2.x through 9.6.0.x contain an 
insufficient lo ...)
+       TODO: check
+CVE-2024-22463 (Dell PowerScale OneFS 8.2.x through 9.6.0.x contains a use of 
a broken ...)
+       TODO: check
+CVE-2024-22452 (Dell Display and Peripheral Manager for macOS prior to 1.3 
contains an ...)
+       TODO: check
+CVE-2024-1788
+       REJECTED
+CVE-2024-0686
+       REJECTED
+CVE-2024-0156 (Dell Digital Delivery, versions prior to 5.0.86.0, contain a 
Buffer Ov ...)
+       TODO: check
+CVE-2024-0155 (Dell Digital Delivery, versions prior to 5.0.86.0, contain a 
Use After ...)
+       TODO: check
+CVE-2023-6241 (Use After Free vulnerability in Arm Ltd Midgard GPU Kernel 
Driver, Arm ...)
+       TODO: check
+CVE-2023-6143 (Use After Free vulnerability in Arm Ltd Midgard GPU Kernel 
Driver, Arm ...)
+       TODO: check
+CVE-2023-6068 (On affected 7130 Series FPGA platforms running MOS and recent 
versions ...)
+       TODO: check
+CVE-2023-5451 (Forcepoint  NGFW Security Management Center Management Server 
has SMC  ...)
+       TODO: check
+CVE-2023-43553 (Memory corruption while parsing beacon/probe response frame 
when AP se ...)
+       TODO: check
+CVE-2023-43552 (Memory corruption while processing MBSSID beacon containing 
several su ...)
+       TODO: check
+CVE-2023-43550 (Memory corruption while processing a QMI request for 
allocating memory ...)
+       TODO: check
+CVE-2023-43549 (Memory corruption while processing TPC target power table in 
FTM TPC.)
+       TODO: check
+CVE-2023-43548 (Memory corruption while parsing qcp clip with invalid chunk 
data size.)
+       TODO: check
+CVE-2023-43547 (Memory corruption while invoking IOCTLs calls in Automotive 
Multimedia ...)
+       TODO: check
+CVE-2023-43546 (Memory corruption while invoking HGSL IOCTL context create.)
+       TODO: check
+CVE-2023-43541 (Memory corruption while invoking the SubmitCommands call on 
Gfx engine ...)
+       TODO: check
+CVE-2023-43540 (Memory corruption while processing the IOCTL FM HCI WRITE 
request.)
+       TODO: check
+CVE-2023-43539 (Transient DOS while processing an improperly formatted 
802.11az Fine T ...)
+       TODO: check
+CVE-2023-38362 (IBM CICS TX Advanced 10.1 could disclose sensitive information 
to a re ...)
+       TODO: check
+CVE-2023-38360 (IBM CICS TX Advanced 10.1 is vulnerable to cross-site 
scripting. This  ...)
+       TODO: check
+CVE-2023-33105 (Transient DOS in WLAN Host and Firmware when large number of 
open auth ...)
+       TODO: check
+CVE-2023-33104 (Transient DOS while processing PDU Release command with a 
parameter PD ...)
+       TODO: check
+CVE-2023-33103 (Transient DOS while processing CAG info IE received from NW.)
+       TODO: check
+CVE-2023-33096 (Transient DOS while processing DL NAS Transport message, as 
specified  ...)
+       TODO: check
+CVE-2023-33095 (Transient DOS while processing multiple payload container type 
with in ...)
+       TODO: check
+CVE-2023-33090 (Transient DOS while processing channel information for speaker 
protect ...)
+       TODO: check
+CVE-2023-33086 (Transient DOS while processing multiple IKEV2 Informational 
Request to ...)
+       TODO: check
+CVE-2023-33084 (Transient DOS while processing IE fragments from server during 
DTLS ha ...)
+       TODO: check
+CVE-2023-33078 (Information Disclosure while processing IOCTL request in 
FastRPC.)
+       TODO: check
+CVE-2023-33066 (Memory corruption in Audio while processing RT proxy port 
register dri ...)
+       TODO: check
+CVE-2023-32331 (IBM Connect:Express for UNIX 1.5.0 is vulnerable to a buffer 
overflow  ...)
+       TODO: check
+CVE-2021-47108 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux 5.15.15-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/3b8e19a0aa3933a785be9f1541afd8d398c4ec69 (5.16-rc7)
-CVE-2021-47107 [NFSD: Fix READDIR buffer overflow]
+CVE-2021-47107 (In the Linux kernel, the following vulnerability has been 
resolved:  N ...)
        - linux 5.15.15-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/53b1119a6e5028b125f431a0116ba73510d82a72 (5.16-rc7)
-CVE-2021-47106 [netfilter: nf_tables: fix use-after-free in 
nft_set_catchall_destroy()]
+CVE-2021-47106 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux 5.15.15-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/0f7d9b31ce7abdbb29bf018131ac920c9f698518 (5.16-rc7)
-CVE-2021-47105 [ice: xsk: return xsk buffers back to pool when cleaning the 
ring]
+CVE-2021-47105 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux 5.15.15-1
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/afe8a3ba85ec2a6b6849367e25c06a2f8e0ddd05 (5.16-rc7)
-CVE-2021-47104 [IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()]
+CVE-2021-47104 (In the Linux kernel, the following vulnerability has been 
resolved:  I ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux 4.19.232-1
        NOTE: 
https://git.kernel.org/linus/bee90911e0138c76ee67458ac0d58b38a3190f65 (5.16-rc7)
-CVE-2021-47103 [inet: fully convert sk->sk_rx_dst to RCU rules]
+CVE-2021-47103 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.158-1
        [buster] - linux 4.19.269-1
        NOTE: 
https://git.kernel.org/linus/8f905c0e7354ef261360fb7535ea079b1082c105 (5.16-rc7)
-CVE-2021-47102 [net: marvell: prestera: fix incorrect structure access]
+CVE-2021-47102 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux 5.15.15-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/2efc2256febf214e7b2bdaa21fe6c3c3146acdcb (5.16-rc7)
-CVE-2021-47101 [asix: fix uninit-value in asix_mdio_read()]
+CVE-2021-47101 (In the Linux kernel, the following vulnerability has been 
resolved:  a ...)
        - linux 5.15.15-1
        NOTE: 
https://git.kernel.org/linus/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03 (5.16-rc7)
-CVE-2021-47100 [ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler 
module]
+CVE-2021-47100 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux 4.19.232-1
        NOTE: 
https://git.kernel.org/linus/ffb76a86f8096a8206be03b14adda6092e18e275 (5.16-rc7)
-CVE-2021-47099 [veth: ensure skb entering GRO are not cloned.]
+CVE-2021-47099 (In the Linux kernel, the following vulnerability has been 
resolved:  v ...)
        - linux 5.15.15-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/9695b7de5b4760ed22132aca919570c0190cb0ce (5.16-rc7)
-CVE-2021-47098 [hwmon: (lm90) Prevent integer overflow/underflow in hysteresis 
calculations]
+CVE-2021-47098 (In the Linux kernel, the following vulnerability has been 
resolved:  h ...)
        - linux 5.15.15-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/55840b9eae5367b5d5b29619dc2fb7e4596dba46 (5.16-rc7)
-CVE-2021-47097 [Input: elantech - fix stack out of bound access in 
elantech_change_report_id()]
+CVE-2021-47097 (In the Linux kernel, the following vulnerability has been 
resolved:  I ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/1d72d9f960ccf1052a0630a68c3d358791dbdaaa (5.16-rc7)
-CVE-2021-47096 [ALSA: rawmidi - fix the uninitalized user_pversion]
+CVE-2021-47096 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
        - linux 5.15.15-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/39a8fc4971a00d22536aeb7d446ee4a97810611b (5.16-rc7)
-CVE-2021-47095 [ipmi: ssif: initialize ssif_info->client early]
+CVE-2021-47095 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/34f35f8f14bc406efc06ee4ff73202c6fd245d15 (5.16-rc7)
-CVE-2021-47094 [KVM: x86/mmu: Don't advance iterator after restart due to 
yielding]
+CVE-2021-47094 (In the Linux kernel, the following vulnerability has been 
resolved:  K ...)
        - linux 5.15.15-1
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/3a0f64de479cae75effb630a2e0a237ca0d0623c (5.16-rc7)
-CVE-2021-47093 [platform/x86: intel_pmc_core: fix memleak on registration 
failure]
+CVE-2021-47093 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/26a8b09437804fabfb1db080d676b96c0de68e7c (5.16-rc7)
-CVE-2021-47092 [KVM: VMX: Always clear vmx->fail on emulation_required]
+CVE-2021-47092 (In the Linux kernel, the following vulnerability has been 
resolved:  K ...)
        - linux 5.15.15-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/a80dfc025924024d2c61a4c1b8ef62b2fce76a04 (5.16-rc7)
-CVE-2021-47091 [mac80211: fix locking in ieee80211_start_ap error path]
+CVE-2021-47091 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/87a270625a89fc841f1a7e21aae6176543d8385c (5.16-rc7)
-CVE-2021-47090 [mm/hwpoison: clear MF_COUNT_INCREASED before retrying 
get_any_page()]
+CVE-2021-47090 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/2a57d83c78f889bf3f54eede908d0643c40d5418 (5.16-rc7)
-CVE-2021-47089 [kfence: fix memory leak when cat kfence objects]
+CVE-2021-47089 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
        - linux 5.15.15-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/0129ab1f268b6cf88825eae819b9b84aa0a85634 (5.16-rc7)
-CVE-2021-47088 [mm/damon/dbgfs: protect targets destructions with kdamond_lock]
+CVE-2021-47088 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
        - linux 5.15.15-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/34796417964b8d0aef45a99cf6c2d20cebe33733 (5.16-rc7)
-CVE-2021-47087 [tee: optee: Fix incorrect page free bug]
+CVE-2021-47087 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/18549bf4b21c739a9def39f27dcac53e27286ab5 (5.16-rc7)
-CVE-2021-47086 [phonet/pep: refuse to enable an unbound pipe]
+CVE-2021-47086 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux 4.19.232-1
        NOTE: 
https://git.kernel.org/linus/75a2f31520095600f650597c0ac41f48b5ba0068 (5.16-rc7)
-CVE-2021-47085 [hamradio: improve the incomplete fix to avoid NPD]
+CVE-2021-47085 (In the Linux kernel, the following vulnerability has been 
resolved:  h ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux 4.19.232-1
        NOTE: 
https://git.kernel.org/linus/b2f37aead1b82a770c48b5d583f35ec22aabb61e (5.16-rc7)
-CVE-2021-47084 [hamradio: defer ax25 kfree after unregister_netdev]
+CVE-2021-47084 (In the Linux kernel, the following vulnerability has been 
resolved:  h ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        [buster] - linux 4.19.232-1
        NOTE: 
https://git.kernel.org/linus/3e0588c291d6ce225f2b891753ca41d45ba42469 (5.16-rc1)
-CVE-2021-47083 [pinctrl: mediatek: fix global-out-of-bounds issue]
+CVE-2021-47083 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.92-1
        NOTE: 
https://git.kernel.org/linus/2d5446da5acecf9c67db1c9d55ae2c3e5de01f8d (5.16-rc7)
-CVE-2021-47082 [tun: avoid double free in tun_free_netdev]
+CVE-2021-47082 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
        - linux 5.15.15-1
        [bullseye] - linux 5.10.136-1
        [buster] - linux 4.19.282-1
@@ -57523,16 +57609,16 @@ CVE-2023-28584 (Transient DOS in WLAN Host when a 
mobile station receives invali
        NOT-FOR-US: Qualcomm
 CVE-2023-28583 (Memory corruption when IPv6 prefix timer object`s lifetime 
expires whi ...)
        NOT-FOR-US: Qualcomm
-CVE-2023-28582
-       RESERVED
+CVE-2023-28582 (Memory corruption in Data Modem while verifying hello-verify 
message d ...)
+       TODO: check
 CVE-2023-28581 (Memory corruption in WLAN Firmware while parsing receieved GTK 
Keys in ...)
        NOT-FOR-US: Qualcomm
 CVE-2023-28580 (Memory corruption in WLAN Host while setting the PMK length in 
PMK len ...)
        NOT-FOR-US: Qualcomm
 CVE-2023-28579 (Memory Corruption in WLAN Host while deserializing the input 
PMK bytes ...)
        NOT-FOR-US: Qualcomm
-CVE-2023-28578
-       RESERVED
+CVE-2023-28578 (Memory corruption in Core Services while executing the command 
for rem ...)
+       TODO: check
 CVE-2023-28577 (In the function call related to CAM_REQ_MGR_RELEASE_BUF there 
is no ch ...)
        NOT-FOR-US: Qualcomm
 CVE-2023-28576 (The buffer obtained from kernel APIs such as 
cam_mem_get_cpu_buf() may ...)
@@ -94249,8 +94335,8 @@ CVE-2022-43892 (IBM Security Verify Privilege 
On-Premises 11.5 does not validate
        NOT-FOR-US: IBM
 CVE-2022-43891 (IBM Security Verify Privilege On-Premises 11.5 could allow a 
remote at ...)
        NOT-FOR-US: IBM
-CVE-2022-43890
-       RESERVED
+CVE-2022-43890 (IBM Security Verify Privilege On-Premises 11.5 could disclose 
sensitiv ...)
+       TODO: check
 CVE-2022-43889 (IBM Security Verify Privilege On-Premises 11.5 could disclose 
sensitiv ...)
        NOT-FOR-US: IBM
 CVE-2022-43888



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/71bb9f02ef1dfa96fe093cdad6b940ece9991818

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/71bb9f02ef1dfa96fe093cdad6b940ece9991818
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to