Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
6fa9a4f6 by security tracker role at 2024-05-14T08:11:51+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,4 +1,122 @@
-CVE-2024-4761
+CVE-2024-4855 (Use after free issue in editcap could cause denial of service
via craf ...)
+ TODO: check
+CVE-2024-4854 (MONGO and ZigBee TLV dissector infinite loops in Wireshark
4.2.0 to 4. ...)
+ TODO: check
+CVE-2024-4853 (Memory handling issue in editcap could cause denial of service
via cra ...)
+ TODO: check
+CVE-2024-4840 (An flaw was found in the OpenStack Platform (RHOSP) director, a
toolse ...)
+ TODO: check
+CVE-2024-4810 (In register_device, the return value of ida_simple_get is
unchecked, i ...)
+ TODO: check
+CVE-2024-4712 (An arbitrary file creation vulnerability exists in PaperCut
NG/MF that ...)
+ TODO: check
+CVE-2024-4445 (The WP Compress \u2013 Image Optimizer [All-In-One] plugin for
WordPre ...)
+ TODO: check
+CVE-2024-4144 (The Simple Basic Contact Form plugin for WordPress for
WordPress is vu ...)
+ TODO: check
+CVE-2024-4139 (Manage Bank Statement ReProcessing Rules does not perform
necessary au ...)
+ TODO: check
+CVE-2024-4138 (Manage Bank Statement ReProcessing Rules does not perform
necessary au ...)
+ TODO: check
+CVE-2024-3241 (The Ultimate Blocks WordPress plugin before 3.1.7 does not
validate a ...)
+ TODO: check
+CVE-2024-3037 (An arbitrary file deletion vulnerability exists in PaperCut
NG/MF that ...)
+ TODO: check
+CVE-2024-34687 (SAP NetWeaver Application Server for ABAP and ABAP Platform do
not suf ...)
+ TODO: check
+CVE-2024-33878
+ REJECTED
+CVE-2024-33009 (SAP Global Label Management is vulnerable to SQL injection. On
exploit ...)
+ TODO: check
+CVE-2024-33008 (SAP Replication Server allows an attacker to use gateway for
executing ...)
+ TODO: check
+CVE-2024-33007 (PDFViewer is a control delivered as part of SAPUI5 product
which shows ...)
+ TODO: check
+CVE-2024-33006 (An unauthenticated attacker can upload a malicious file to the
server ...)
+ TODO: check
+CVE-2024-33004 (SAP Business Objects Business Intelligence Platform is
vulnerable to I ...)
+ TODO: check
+CVE-2024-33002 (Document Service handler (obsolete) in Data Provisioning
Service does ...)
+ TODO: check
+CVE-2024-33000 (SAP Bank Account Management does not perform necessary
authorization c ...)
+ TODO: check
+CVE-2024-32733 (Due to missing input validation and output encoding of
untrusted data, ...)
+ TODO: check
+CVE-2024-32731 (SAP My Travel Requests does not perform necessary
authorization checks ...)
+ TODO: check
+CVE-2024-28165 (SAP Business Objects Business Intelligence Platform is
vulnerable to s ...)
+ TODO: check
+CVE-2024-27852 (A privacy issue was addressed with improved client ID handling
for alt ...)
+ TODO: check
+CVE-2024-27847 (This issue was addressed with improved checks This issue is
fixed in i ...)
+ TODO: check
+CVE-2024-27843 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2024-27842 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-27841 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2024-27839 (A privacy issue was addressed by moving sensitive data to a
more secur ...)
+ TODO: check
+CVE-2024-27837 (A downgrade issue was addressed with additional code-signing
restricti ...)
+ TODO: check
+CVE-2024-27835 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2024-27834 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2024-27829 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2024-27827 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2024-27825 (A downgrade issue affecting Intel-based Mac computers was
addressed wi ...)
+ TODO: check
+CVE-2024-27824 (This issue was addressed by removing the vulnerable code. This
issue i ...)
+ TODO: check
+CVE-2024-27822 (A logic issue was addressed with improved restrictions. This
issue is ...)
+ TODO: check
+CVE-2024-27821 (A path handling issue was addressed with improved validation.
This iss ...)
+ TODO: check
+CVE-2024-27818 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2024-27816 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2024-27813 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-27810 (A path handling issue was addressed with improved validation.
This iss ...)
+ TODO: check
+CVE-2024-27804 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2024-27803 (A permissions issue was addressed with improved validation.
This issue ...)
+ TODO: check
+CVE-2024-27798 (An authorization issue was addressed with improved state
management. T ...)
+ TODO: check
+CVE-2024-27796 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2024-27789 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2024-25970 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.1 contains
an impro ...)
+ TODO: check
+CVE-2024-25969 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.1 contains
an alloc ...)
+ TODO: check
+CVE-2024-25968 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains
a use of ...)
+ TODO: check
+CVE-2024-25967 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.1 contains
an execu ...)
+ TODO: check
+CVE-2024-25966 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains
an impro ...)
+ TODO: check
+CVE-2024-25965 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains
an exter ...)
+ TODO: check
+CVE-2024-23576 (Security vulnerability in HCL Commerce 9.1.12 and 9.1.13 could
allow d ...)
+ TODO: check
+CVE-2024-23236 (A correctness issue was addressed with improved checks. This
issue is ...)
+ TODO: check
+CVE-2024-23229 (This issue was addressed with improved redaction of sensitive
informat ...)
+ TODO: check
+CVE-2024-0870 (The YITH WooCommerce Gift Cards plugin for WordPress is
vulnerable to ...)
+ TODO: check
+CVE-2023-6812 (The WP Compress \u2013 Image Optimizer [All-In-One plugin for
WordPres ...)
+ TODO: check
+CVE-2024-4761 (Out of bounds write in V8 in Google Chrome prior to
124.0.6367.207 all ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
@@ -1635,7 +1753,7 @@ CVE-2024-4558 (Use after free in ANGLE in Google Chrome
prior to 124.0.6367.155
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2024-34397 (An issue was discovered in GNOME GLib before 2.78.5, and
2.79.x and 2. ...)
- {DSA-5682-1}
+ {DSA-5682-1 DLA-3814-1}
- glib2.0 2.80.0-10
NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/3268
NOTE: Fixes: https://gitlab.gnome.org/GNOME/glib/-/issues/3268#fixes
@@ -31068,12 +31186,14 @@ CVE-2023-52355 (An out-of-memory flaw was found in
libtiff that could be trigger
NOTE:
https://gitlab.com/libtiff/libtiff/-/commit/16ab4a205cfc938c32686e8d697d048fabf97ed4
NOTE: Issue fixed by providing a documentation update
CVE-2023-40551 (A flaw was found in the MZ binary format in Shim. An
out-of-bounds rea ...)
+ {DLA-3813-1}
- shim 15.8-1 (bug #1061519)
[bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
[bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2259918
NOTE:
https://github.com/rhboot/shim/commit/5a5147d1e19cf90ec280990c84061ac3f67ea1ab
(15.8)
CVE-2023-40550 (An out-of-bounds read flaw was found in Shim when it tried to
validate ...)
+ {DLA-3813-1}
- shim 15.8-1 (bug #1061519)
[bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
[bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
@@ -31081,24 +31201,28 @@ CVE-2023-40550 (An out-of-bounds read flaw was found
in Shim when it tried to va
NOTE:
https://github.com/rhboot/shim/commit/93ce2552f3e9f71f888a672913bfc0eef255c56d
(15.8)
NOTE: Followup:
https://github.com/rhboot/shim/commit/e7f5fdf53ee68025f3ef2688e2f27ccb0082db83
(15.8)
CVE-2023-40549 (An out-of-bounds read flaw was found in Shim due to the lack
of proper ...)
+ {DLA-3813-1}
- shim 15.8-1 (bug #1061519)
[bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
[bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2241797
NOTE:
https://github.com/rhboot/shim/commit/afdc5039de0a4a3a40162a32daa070f94a883f09
(15.8)
CVE-2023-40548 (A buffer overflow was found in Shim in the 32-bit system. The
overflow ...)
+ {DLA-3813-1}
- shim 15.8-1 (bug #1061519)
[bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
[bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2241782
NOTE:
https://github.com/rhboot/shim/commit/96dccc255b16e9465dbee50b3cef6b3db74d11c8
(15.8)
CVE-2023-40547 (A remote code execution vulnerability was found in Shim. The
Shim boot ...)
+ {DLA-3813-1}
- shim 15.8-1 (bug #1061519)
[bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
[bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2234589
NOTE:
https://github.com/rhboot/shim/commit/0226b56513b2b8bd5fd281bce77c40c9bf07c66d
(15.8)
CVE-2023-40546 (A flaw was found in Shim when an error happened while creating
a new E ...)
+ {DLA-3813-1}
- shim 15.8-1 (bug #1061519)
[bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
[bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6fa9a4f6e32d0fb1d7420fbb876c4cc69db71b0c
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6fa9a4f6e32d0fb1d7420fbb876c4cc69db71b0c
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits