Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8efc4b61 by Moritz Muehlenhoff at 2024-05-31T12:51:11+02:00
new nginx issues (and update status for older ones)

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -675,15 +675,31 @@ CVE-2024-35284 (A vulnerability in the legacy chat 
component of Mitel MiContact
 CVE-2024-35283 (A vulnerability in the Ignite component of Mitel MiContact 
Center Busi ...)
        NOT-FOR-US: Mitel
 CVE-2024-35200 (When NGINX Plus or NGINX OSS are configured to use the HTTP/3 
QUIC mod ...)
-       TODO: check
+       - nginx <unfixed>
+       [bookworm] - nginx <not-affected> (Vulnerable code not present)
+       [bullseye] - nginx <not-affected> (Vulnerable code not present)
+       [buster] - nginx <not-affected> (Vulnerable code not present)
+       NOTE: 
https://mailman.nginx.org/pipermail/nginx-announce/2024/GMY32CSHFH6VFTN76HJNX7WNEX4RLHF6.html
 CVE-2024-34715 (Fides is an open-source privacy engineering platform. The 
Fides webser ...)
        NOT-FOR-US: Fides
 CVE-2024-34161 (When NGINX Plus or NGINX OSS are configured to use the HTTP/3 
QUIC mod ...)
-       TODO: check
+       - nginx <unfixed>
+       [bookworm] - nginx <not-affected> (Vulnerable code not present)
+       [bullseye] - nginx <not-affected> (Vulnerable code not present)
+       [buster] - nginx <not-affected> (Vulnerable code not present)
+       NOTE: 
https://mailman.nginx.org/pipermail/nginx-announce/2024/GMY32CSHFH6VFTN76HJNX7WNEX4RLHF6.html
 CVE-2024-32760 (When NGINX Plus or NGINX OSS are configured to use the HTTP/3 
QUIC mod ...)
-       TODO: check
+       - nginx <unfixed>
+       [bookworm] - nginx <not-affected> (Vulnerable code not present)
+       [bullseye] - nginx <not-affected> (Vulnerable code not present)
+       [buster] - nginx <not-affected> (Vulnerable code not present)
+       NOTE: 
https://mailman.nginx.org/pipermail/nginx-announce/2024/GMY32CSHFH6VFTN76HJNX7WNEX4RLHF6.html
 CVE-2024-31079 (When NGINX Plus or NGINX OSS are configured to use the HTTP/3 
QUIC mod ...)
-       TODO: check
+       - nginx <unfixed>
+       [bookworm] - nginx <not-affected> (Vulnerable code not present)
+       [bullseye] - nginx <not-affected> (Vulnerable code not present)
+       [buster] - nginx <not-affected> (Vulnerable code not present)
+       NOTE: 
https://mailman.nginx.org/pipermail/nginx-announce/2024/GMY32CSHFH6VFTN76HJNX7WNEX4RLHF6.html
 CVE-2024-28974 (Dell Data Protection Advisor, version(s) 19.9, contain(s) an 
Inadequat ...)
        NOT-FOR-US: Dell
 CVE-2024-28826 (Improper restriction of local upload and download paths in 
check_sftp  ...)
@@ -35027,9 +35043,17 @@ CVE-2024-25165 (A global-buffer-overflow vulnerability 
was found in SWFTools v0.
        - swftools <removed>
        NOTE: https://github.com/matthiaskramm/swftools/issues/217
 CVE-2024-24990 (When NGINX Plus or NGINX OSS are configured to use the HTTP/3 
QUIC mod ...)
-       NOT-FOR-US: Quic module for Nginx
+       - nginx 1.26.0-1
+       [bookworm] - nginx <not-affected> (Vulnerable code not present)
+       [bullseye] - nginx <not-affected> (Vulnerable code not present)
+       [buster] - nginx <not-affected> (Vulnerable code not present)
+       NOTE: 
https://mailman.nginx.org/pipermail/nginx-announce/2024/NW6MNW34VZ6HDIHH5YFBIJYZJN7FGNAV.html
 CVE-2024-24989 (When NGINX Plus or NGINX OSS are configured to use the HTTP/3 
QUIC mod ...)
-       NOT-FOR-US: Quic module for Nginx
+       - nginx 1.26.0-1
+       [bookworm] - nginx <not-affected> (Vulnerable code not present)
+       [bullseye] - nginx <not-affected> (Vulnerable code not present)
+       [buster] - nginx <not-affected> (Vulnerable code not present)
+       NOTE: 
https://mailman.nginx.org/pipermail/nginx-announce/2024/NW6MNW34VZ6HDIHH5YFBIJYZJN7FGNAV.html
 CVE-2024-24966 (When LDAP remote authentication is configured on F5OS, a 
remote user w ...)
        NOT-FOR-US: F5 BIG-IP
 CVE-2024-24775 (When a virtual server is enabled with VLAN group and SNAT 
listener is  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8efc4b61d23a13afa3aed51fd97b31531d49b322

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8efc4b61d23a13afa3aed51fd97b31531d49b322
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to