Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3e6f467e by Moritz Muehlenhoff at 2024-06-12T23:53:54+02:00
add references to slic3r-prusa/libigl issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -3984,24 +3984,34 @@ CVE-2024-24851 (A heap-based buffer overflow 
vulnerability exists in the Program
        NOT-FOR-US: AutomationDirect
 CVE-2024-24686 (Multiple stack-based buffer overflow vulnerabilities exist in 
the read ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1929
 CVE-2024-24685 (Multiple stack-based buffer overflow vulnerabilities exist in 
the read ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1929
 CVE-2024-24684 (Multiple stack-based buffer overflow vulnerabilities exist in 
the read ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1929
 CVE-2024-24584 (Multiple out-of-bounds read vulnerabilities exist in the 
readMSH funct ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1928
 CVE-2024-24583 (Multiple out-of-bounds read vulnerabilities exist in the 
readMSH funct ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1928
 CVE-2024-23951 (Multiple improper array index validation vulnerabilities exist 
in the  ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926
 CVE-2024-23950 (Multiple improper array index validation vulnerabilities exist 
in the  ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926
 CVE-2024-23949 (Multiple improper array index validation vulnerabilities exist 
in the  ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926
 CVE-2024-23948 (Multiple improper array index validation vulnerabilities exist 
in the  ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926
 CVE-2024-23947 (Multiple improper array index validation vulnerabilities exist 
in the  ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926
 CVE-2024-23601 (A code injection vulnerability exists in the scan_lib.bin 
functionalit ...)
        NOT-FOR-US: AutomationDirect
 CVE-2024-23315 (A read-what-where vulnerability exists in the Programming 
Software Con ...)
@@ -4012,10 +4022,12 @@ CVE-2024-22187 (A write-what-where vulnerability exists 
in the Programming Softw
        NOT-FOR-US: AutomationDirect
 CVE-2024-22181 (An out-of-bounds write vulnerability exists in the readNODE 
functional ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1930
 CVE-2024-21785 (A leftover debug code vulnerability exists in the Telnet 
Diagnostic In ...)
        NOT-FOR-US: AutomationDirect
 CVE-2023-49600 (An out-of-bounds write vulnerability exists in the PlyFile 
ply_cast_as ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1879
 CVE-2023-46694 (Vtenext 21.02 allows an authenticated attacker to upload 
arbitrary fil ...)
        NOT-FOR-US: Vtenext
 CVE-2023-43850 (Improper input validation in the user management function of 
web inter ...)
@@ -4040,14 +4052,19 @@ CVE-2023-37411 (IBM Aspera Faspex 5.0.0 through 5.0.6 
is vulnerable to cross-sit
        NOT-FOR-US: IBM
 CVE-2023-35953 (Multiple stack-based buffer overflow vulnerabilities exist in 
the read ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784
 CVE-2023-35952 (Multiple stack-based buffer overflow vulnerabilities exist in 
the read ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784
 CVE-2023-35951 (Multiple stack-based buffer overflow vulnerabilities exist in 
the read ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784
 CVE-2023-35950 (Multiple stack-based buffer overflow vulnerabilities exist in 
the read ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784
 CVE-2023-35949 (Multiple stack-based buffer overflow vulnerabilities exist in 
the read ...)
        - slic3r-prusa <unfixed>
+       NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784
 CVE-2024-4741 [Use After Free with SSL_free_buffers]
        - openssl 3.2.2-1 (bug #1072113)
        [bookworm] - openssl <postponed> (Minor issue, fix along with next 
update round)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3e6f467e09830432f7a8d0966a699a766e6af678

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3e6f467e09830432f7a8d0966a699a766e6af678
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to