Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
35f9e96e by Moritz Muehlenhoff at 2024-06-18T11:21:20+02:00
new cvc5 issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -128,9 +128,15 @@ CVE-2024-37848 (SQL Injection vulnerability in 
Online-Bookstore-Project-In-PHP v
 CVE-2024-37840 (SQL injection vulnerability in processscore.php in 
Itsourcecode Learni ...)
        NOT-FOR-US: Itsourcecode Learning Management System Project In PHP With 
Source Code
 CVE-2024-37795 (A segmentation fault in CVC5 Solver v1.1.3 allows attackers to 
cause a ...)
-       TODO: check
+       - cvc5 <unfixed>
+       [bookworm] - cvc5 <no-dsa> (Minor issue)
+       [bullseye] - cvc5 <no-dsa> (Minor issue)
+       NOTE: https://github.com/cvc5/cvc5/issues/10813
 CVE-2024-37794 (Improper input validation in CVC5 Solver v1.1.3 allows 
attackers to ca ...)
-       TODO: check
+       - cvc5 <unfixed>
+       [bookworm] - cvc5 <no-dsa> (Minor issue)
+       [bullseye] - cvc5 <no-dsa> (Minor issue)
+       NOTE: https://github.com/cvc5/cvc5/issues/10813
 CVE-2024-37664 (Redmi router RB03 v1.0.57 is vulnerable to TCP DoS or 
hijacking attack ...)
        NOT-FOR-US: Redmi router
 CVE-2024-37663 (Redmi router RB03 v1.0.57 is vulnerable to forged ICMP 
redirect messag ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/35f9e96e68b857f09de7d7a63f1cd7118beca085

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/35f9e96e68b857f09de7d7a63f1cd7118beca085
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to