Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
00a4ba72 by security tracker role at 2024-08-13T20:12:38+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,313 @@
+CVE-2024-7746 (Use of Default Credentials vulnerability in Tananaev Solutions
Traccar ...)
+ TODO: check
+CVE-2024-7741 (A vulnerability was found in wanglongcn ltcms 1.0.20 and
classified as ...)
+ TODO: check
+CVE-2024-7740 (A vulnerability has been found in wanglongcn ltcms 1.0.20 and
classifi ...)
+ TODO: check
+CVE-2024-7739 (A vulnerability, which was classified as problematic, was found
in yza ...)
+ TODO: check
+CVE-2024-7738 (A vulnerability, which was classified as problematic, has been
found i ...)
+ TODO: check
+CVE-2024-7733 (A vulnerability, which was classified as problematic, was found
in Fas ...)
+ TODO: check
+CVE-2024-7593 (Incorrect implementation of an authentication algorithm in
Ivanti vTM ...)
+ TODO: check
+CVE-2024-7570 (Improper certificate validation in Ivanti ITSM on-prem and
Neurons for ...)
+ TODO: check
+CVE-2024-7569 (An information disclosure vulnerability in Ivanti ITSM on-prem
and Neu ...)
+ TODO: check
+CVE-2024-7567 (A denial-of-service vulnerability exists via the CIP/Modbus
port in th ...)
+ TODO: check
+CVE-2024-7113 (If exploited, this vulnerability could cause a SuiteLink server
to con ...)
+ TODO: check
+CVE-2024-6788 (A remote unauthenticated attacker can use the firmware update
feature ...)
+ TODO: check
+CVE-2024-6619 (In Ocean Data Systems Dream Report, an incorrect permission
vulnerabil ...)
+ TODO: check
+CVE-2024-6618 (In Ocean Data Systems Dream Report, a path traversal
vulnerability cou ...)
+ TODO: check
+CVE-2024-6384 ("Hot" backup files may be downloaded by underprivileged users,
if they ...)
+ TODO: check
+CVE-2024-6079 (A vulnerability exists in the Rockwell Automation
Emulate3D\u2122,whic ...)
+ TODO: check
+CVE-2024-5849 (An unauthenticated remote attacker may use a reflected XSS
vulnerabili ...)
+ TODO: check
+CVE-2024-43165 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-43160 (Unrestricted Upload of File with Dangerous Type vulnerability
in BerqW ...)
+ TODO: check
+CVE-2024-43153 (Improper Privilege Management vulnerability in WofficeIO
Woffice allow ...)
+ TODO: check
+CVE-2024-43141 (Deserialization of Untrusted Data vulnerability in Roland
Barker, xnau ...)
+ TODO: check
+CVE-2024-43140 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-43138 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-43135 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-43131 (Incorrect Authorization vulnerability in WPWeb Docket
(WooCommerce Col ...)
+ TODO: check
+CVE-2024-43129 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-43128 (Improper Control of Generation of Code ('Code Injection')
vulnerabilit ...)
+ TODO: check
+CVE-2024-43121 (Improper Privilege Management vulnerability in realmag777
HUSKY allows ...)
+ TODO: check
+CVE-2024-42740 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file
/cgi-bin/cstecgi. ...)
+ TODO: check
+CVE-2024-42739 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file
/cgi-bin/cstecgi. ...)
+ TODO: check
+CVE-2024-42738 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file
/cgi-bin/cstecgi. ...)
+ TODO: check
+CVE-2024-42737 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file
/cgi-bin/cstecgi. ...)
+ TODO: check
+CVE-2024-42736 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file
/cgi-bin/cstecgi. ...)
+ TODO: check
+CVE-2024-42368 (OpenTelemetry, also known as OTel, is a vendor-neutral open
source Obs ...)
+ TODO: check
+CVE-2024-41774 (IBM Common Licensing 9.0 is vulnerable to stored cross-site
scripting. ...)
+ TODO: check
+CVE-2024-41711 (A vulnerability in the Mitel 6800 Series, 6900 Series, and
6900w Serie ...)
+ TODO: check
+CVE-2024-41623 (An issue in D3D Security D3D IP Camera (D8801)
v.V9.1.17.1.4-20180428 ...)
+ TODO: check
+CVE-2024-41614 (symphonycms <=2.7.10 is vulnerable to Cross Site Scripting
(XSS) in th ...)
+ TODO: check
+CVE-2024-41613 (A Cross Site Scripting (XSS) vulnerability in Symphony CMS
2.7.10 allo ...)
+ TODO: check
+CVE-2024-40697 (IBM Common Licensing 9.0 does not require that users should
have stron ...)
+ TODO: check
+CVE-2024-3913 (An unauthenticated remote attacker can use this vulnerability
to chang ...)
+ TODO: check
+CVE-2024-39651 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-39642 (Authorization Bypass Through User-Controlled Key vulnerability
in Thim ...)
+ TODO: check
+CVE-2024-38787 (Exposure of Sensitive Information to an Unauthorized Actor
vulnerabili ...)
+ TODO: check
+CVE-2024-38760 (Exposure of Sensitive Information to an Unauthorized Actor
vulnerabili ...)
+ TODO: check
+CVE-2024-38756 (Exposure of Sensitive Information to an Unauthorized Actor
vulnerabili ...)
+ TODO: check
+CVE-2024-38752 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-38749 (Exposure of Sensitive Information to an Unauthorized Actor
vulnerabili ...)
+ TODO: check
+CVE-2024-38747 (Exposure of Sensitive Information to an Unauthorized Actor
vulnerabili ...)
+ TODO: check
+CVE-2024-38742 (Exposure of Sensitive Information to an Unauthorized Actor
vulnerabili ...)
+ TODO: check
+CVE-2024-38724 (Cross-Site Request Forgery (CSRF), Improper Neutralization of
Input Du ...)
+ TODO: check
+CVE-2024-38699 (Missing Authorization vulnerability in WP Swings Wallet System
for Woo ...)
+ TODO: check
+CVE-2024-38688 (Missing Authorization vulnerability in Igor Beni\u0107 Recipe
Maker Fo ...)
+ TODO: check
+CVE-2024-38502 (An unauthenticated remote attacker may use stored XSS
vulnerability to ...)
+ TODO: check
+CVE-2024-38501 (An unauthenticated remote attacker may use a HTML injection
vulnerabil ...)
+ TODO: check
+CVE-2024-38223 (Windows Initial Machine Configuration Elevation of Privilege
Vulnerabi ...)
+ TODO: check
+CVE-2024-38215 (Windows Cloud Files Mini Filter Driver Elevation of Privilege
Vulnerab ...)
+ TODO: check
+CVE-2024-38214 (Windows Routing and Remote Access Service (RRAS) Information
Disclosur ...)
+ TODO: check
+CVE-2024-38213 (Windows Mark of the Web Security Feature Bypass Vulnerability)
+ TODO: check
+CVE-2024-38211 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting
Vulnerabilit ...)
+ TODO: check
+CVE-2024-38201 (Azure Stack Hub Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-38199 (Windows Line Printer Daemon (LPD) Service Remote Code
Execution Vulner ...)
+ TODO: check
+CVE-2024-38198 (Windows Print Spooler Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-38197 (Microsoft Teams for iOS Spoofing Vulnerability)
+ TODO: check
+CVE-2024-38196 (Windows Common Log File System Driver Elevation of Privilege
Vulnerabi ...)
+ TODO: check
+CVE-2024-38195 (Azure CycleCloud Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-38193 (Windows Ancillary Function Driver for WinSock Elevation of
Privilege V ...)
+ TODO: check
+CVE-2024-38191 (Kernel Streaming Service Driver Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2024-38189 (Microsoft Project Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-38187 (Windows Kernel-Mode Driver Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2024-38186 (Windows Kernel-Mode Driver Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2024-38185 (Windows Kernel-Mode Driver Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2024-38184 (Windows Kernel-Mode Driver Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2024-38180 (Windows SmartScreen Security Feature Bypass Vulnerability)
+ TODO: check
+CVE-2024-38178 (Scripting Engine Memory Corruption Vulnerability)
+ TODO: check
+CVE-2024-38177 (Windows App Installer Spoofing Vulnerability)
+ TODO: check
+CVE-2024-38173 (Microsoft Outlook Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-38172 (Microsoft Excel Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-38171 (Microsoft PowerPoint Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-38170 (Microsoft Excel Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-38169 (Microsoft Office Visio Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-38168 (.NET and Visual Studio Denial of Service Vulnerability)
+ TODO: check
+CVE-2024-38167 (.NET and Visual Studio Information Disclosure Vulnerability)
+ TODO: check
+CVE-2024-38165 (Windows Compressed Folder Tampering Vulnerability)
+ TODO: check
+CVE-2024-38162 (Azure Connected Machine Agent Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2024-38161 (Windows Mobile Broadband Driver Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-38160 (Windows Network Virtualization Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-38159 (Windows Network Virtualization Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-38158 (Azure IoT SDK Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-38157 (Azure IoT SDK Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-38155 (Security Center Broker Information Disclosure Vulnerability)
+ TODO: check
+CVE-2024-38154 (Windows Routing and Remote Access Service (RRAS) Remote Code
Execution ...)
+ TODO: check
+CVE-2024-38153 (Windows Kernel Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-38152 (Windows OLE Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-38151 (Windows Kernel Information Disclosure Vulnerability)
+ TODO: check
+CVE-2024-38150 (Windows DWM Core Library Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-38148 (Windows Secure Channel Denial of Service Vulnerability)
+ TODO: check
+CVE-2024-38147 (Microsoft DWM Core Library Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2024-38146 (Windows Layer-2 Bridge Network Driver Denial of Service
Vulnerability)
+ TODO: check
+CVE-2024-38145 (Windows Layer-2 Bridge Network Driver Denial of Service
Vulnerability)
+ TODO: check
+CVE-2024-38144 (Kernel Streaming WOW Thunk Service Driver Elevation of
Privilege Vulne ...)
+ TODO: check
+CVE-2024-38143 (Windows WLAN AutoConfig Service Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2024-38142 (Windows Secure Kernel Mode Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2024-38141 (Windows Ancillary Function Driver for WinSock Elevation of
Privilege V ...)
+ TODO: check
+CVE-2024-38140 (Windows Reliable Multicast Transport Driver (RMCAST) Remote
Code Execu ...)
+ TODO: check
+CVE-2024-38138 (Windows Deployment Services Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-38137 (Windows Resource Manager PSM Service Extension Elevation of
Privilege ...)
+ TODO: check
+CVE-2024-38136 (Windows Resource Manager PSM Service Extension Elevation of
Privilege ...)
+ TODO: check
+CVE-2024-38135 (Windows Resilient File System (ReFS) Elevation of Privilege
Vulnerabil ...)
+ TODO: check
+CVE-2024-38134 (Kernel Streaming WOW Thunk Service Driver Elevation of
Privilege Vulne ...)
+ TODO: check
+CVE-2024-38133 (Windows Kernel Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-38132 (Windows Network Address Translation (NAT) Denial of Service
Vulnerabil ...)
+ TODO: check
+CVE-2024-38131 (Clipboard Virtual Channel Extension Remote Code Execution
Vulnerabilit ...)
+ TODO: check
+CVE-2024-38130 (Windows Routing and Remote Access Service (RRAS) Remote Code
Execution ...)
+ TODO: check
+CVE-2024-38128 (Windows Routing and Remote Access Service (RRAS) Remote Code
Execution ...)
+ TODO: check
+CVE-2024-38127 (Windows Hyper-V Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-38126 (Windows Network Address Translation (NAT) Denial of Service
Vulnerabil ...)
+ TODO: check
+CVE-2024-38125 (Kernel Streaming WOW Thunk Service Driver Elevation of
Privilege Vulne ...)
+ TODO: check
+CVE-2024-38123 (Windows Bluetooth Driver Information Disclosure Vulnerability)
+ TODO: check
+CVE-2024-38122 (Microsoft Local Security Authority (LSA) Server Information
Disclosure ...)
+ TODO: check
+CVE-2024-38121 (Windows Routing and Remote Access Service (RRAS) Remote Code
Execution ...)
+ TODO: check
+CVE-2024-38120 (Windows Routing and Remote Access Service (RRAS) Remote Code
Execution ...)
+ TODO: check
+CVE-2024-38118 (Microsoft Local Security Authority (LSA) Server Information
Disclosure ...)
+ TODO: check
+CVE-2024-38117 (NTFS Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-38116 (Windows IP Routing Management Snapin Remote Code Execution
Vulnerabili ...)
+ TODO: check
+CVE-2024-38115 (Windows IP Routing Management Snapin Remote Code Execution
Vulnerabili ...)
+ TODO: check
+CVE-2024-38114 (Windows IP Routing Management Snapin Remote Code Execution
Vulnerabili ...)
+ TODO: check
+CVE-2024-38109 (An authenticated attacker can exploit an Server-Side Request
Forgery ( ...)
+ TODO: check
+CVE-2024-38108 (Azure Stack Hub Spoofing Vulnerability)
+ TODO: check
+CVE-2024-38107 (Windows Power Dependency Coordinator Elevation of Privilege
Vulnerabil ...)
+ TODO: check
+CVE-2024-38106 (Windows Kernel Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-38098 (Azure Connected Machine Agent Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2024-38084 (Microsoft OfficePlus Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-38063 (Windows TCP/IP Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2024-37968 (Windows DNS Spoofing Vulnerability)
+ TODO: check
+CVE-2024-37935 (Missing Authorization vulnerability in anhvnit Woocommerce
OpenPos all ...)
+ TODO: check
+CVE-2024-37287 (A flaw allowing arbitrary code execution was discovered in
Kibana. An ...)
+ TODO: check
+CVE-2024-37015 (An issue was discovered in Ada Web Server 20.0. When
configured to use ...)
+ TODO: check
+CVE-2024-36505 (An improper access control vulnerability [CWE-284] in FortiOS
7.4.0 th ...)
+ TODO: check
+CVE-2024-36446 (The provisioning manager component of Mitel MiVoice MX-ONE
through 7.6 ...)
+ TODO: check
+CVE-2024-35124 (A vulnerability in the combination of the OpenBMC's FW1050.00
through ...)
+ TODO: check
+CVE-2024-2259 (This vulnerability exists in InstaRISPACS software due to
insufficient ...)
+ TODO: check
+CVE-2024-29995 (Windows Kerberos Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-21981 (Improper key usage control in AMD Secure Processor (ASP) may
allow an ...)
+ TODO: check
+CVE-2024-21757 (A unverified password change in Fortinet FortiManager versions
7.0.0 t ...)
+ TODO: check
+CVE-2023-31366 (Improper input validation in AMD \u03bcProf could allow an
attacker to ...)
+ TODO: check
+CVE-2023-31356 (Incomplete system memory cleanup in SEV firmware could allow a
privile ...)
+ TODO: check
+CVE-2023-31349 (Incorrect default permissions in the AMD \u03bcProf
installation direc ...)
+ TODO: check
+CVE-2023-31348 (A DLL hijacking vulnerability in AMD \u03bcProf could allow an
attacke ...)
+ TODO: check
+CVE-2023-31341 (Insufficient validation of the Input Output Control (IOCTL)
input buff ...)
+ TODO: check
+CVE-2023-31339 (Improper input validation in ARM\xae Trusted Firmware used in
AMD\u201 ...)
+ TODO: check
+CVE-2023-31310 (Improper input validation in Power Management Firmware (PMFW)
may allo ...)
+ TODO: check
+CVE-2023-31307 (Improper validation of array index in Power Management
Firmware (PMFW) ...)
+ TODO: check
+CVE-2023-31305 (Generation of weak and predictable Initialization Vector (IV)
in PMFW ...)
+ TODO: check
+CVE-2023-31304 (Improper input validation in SMU may allow an attacker with
privileges ...)
+ TODO: check
CVE-2024-7715 (** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in
D-Link DN ...)
NOT-FOR-US: D-Link
CVE-2024-7709 (A vulnerability, which was classified as problematic, has been
found i ...)
@@ -1716,16 +2026,16 @@ CVE-2024-6472 (Certificate Validation user interface in
LibreOffice allows poten
NOTE:
https://github.com/LibreOffice/core/commit/2587dbff640e2443f0800f9c1a865723500de1c5
(distro/mimo/7-0)
NOTE:
https://github.com/LibreOffice/core/commit/b8c9ba427e23e45ef782d6a144f4415cae3c9b13
(distro/mimo/6-2)
CVE-2024-42010 (mod_css_styles in Roundcube through 1.5.7 and 1.6.x through
1.6.7 insu ...)
- {DSA-5743-1}
+ {DSA-5743-2 DSA-5743-1}
- roundcube 1.6.8+dfsg-1 (bug #1077969)
NOTE:
https://github.com/roundcube/roundcubemail/commit/602d0f566eb39b6dcb739ad78323ec434a3b92ce
CVE-2024-42009 (A Cross-Site Scripting vulnerability in Roundcube through
1.5.7 and 1. ...)
- {DSA-5743-1}
+ {DSA-5743-2 DSA-5743-1}
- roundcube 1.6.8+dfsg-1 (bug #1077969)
NOTE:
https://www.sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/
NOTE:
https://github.com/roundcube/roundcubemail/commit/68af7c864a36e1941764238dac440ab0d99a8d26
CVE-2024-42008 (A Cross-Site Scripting vulnerability in
rcmail_action_mail_get->run() ...)
- {DSA-5743-1}
+ {DSA-5743-2 DSA-5743-1}
- roundcube 1.6.8+dfsg-1 (bug #1077969)
NOTE:
https://github.com/roundcube/roundcubemail/commit/89c8fe9ae9318c015807fbcbf7e39555fb30885d
NOTE: Regression/follow-up:
https://github.com/roundcube/roundcubemail/commit/32fed15346e5b842042e5dd1001d6878225c5367
@@ -113607,8 +113917,8 @@ CVE-2023-26213 (On Barracuda CloudGen WAN Private
Edge Gateway devices before 8
NOT-FOR-US: Barracuda
CVE-2023-26212
RESERVED
-CVE-2023-26211
- RESERVED
+CVE-2023-26211 (An improper neutralization of input during web page generation
('cross ...)
+ TODO: check
CVE-2023-26210 (Multiple improper neutralization of special elements used in
an os com ...)
NOT-FOR-US: Fortinet
CVE-2023-26209 (A improper restriction of excessive authentication attempts
vulnerabil ...)
@@ -134820,8 +135130,8 @@ CVE-2022-45864
RESERVED
CVE-2022-45863
RESERVED
-CVE-2022-45862
- RESERVED
+CVE-2022-45862 (An insufficient session expiration vulnerability [CWE-613]
vulnerabili ...)
+ TODO: check
CVE-2022-45861 (An access of uninitialized pointer vulnerability [CWE-824] in
the SSL ...)
NOT-FOR-US: Fortinet
CVE-2022-45860 (A weak authentication vulnerability [CWE-1390] in FortiNAC-F
version 7 ...)
@@ -141821,8 +142131,8 @@ CVE-2023-20592 (Improper or unexpected behavior of
the INVD instruction in some
[buster] - amd64-microcode 3.20230719.1~deb10u1
NOTE: https://cachewarpattack.com/
NOTE:
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3005.html
-CVE-2023-20591
- RESERVED
+CVE-2023-20591 (Improper re-initialization of IOMMU during the DRTM event may
permit a ...)
+ TODO: check
CVE-2023-20590
RESERVED
CVE-2023-20589 (An attacker with specialized hardware and physical access to
an impact ...)
@@ -141846,8 +142156,8 @@ CVE-2023-20586 (A potential vulnerability was
reported in Radeon\u2122 Software
NOT-FOR-US: AMD
CVE-2023-20585
RESERVED
-CVE-2023-20584
- RESERVED
+CVE-2023-20584 (IOMMU improperly handles certain special address ranges with
invalid d ...)
+ TODO: check
CVE-2023-20583 (A potential power side-channel vulnerability in AMD processors
may all ...)
NOT-FOR-US: AMD
CVE-2023-20582
@@ -141858,8 +142168,8 @@ CVE-2023-20580
RESERVED
CVE-2023-20579 (Improper Access Control in the AMD SPI protection feature may
allow a ...)
NOT-FOR-US: AMD
-CVE-2023-20578
- RESERVED
+CVE-2023-20578 (A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an
attacker with ...)
+ TODO: check
CVE-2023-20577
NOT-FOR-US: AMD
CVE-2023-20576
@@ -141999,8 +142309,8 @@ CVE-2023-20520 (Improper access control settings in
ASP Bootloader may allow an
NOT-FOR-US: AMD
CVE-2023-20519 (A Use-After-Free vulnerability in the management of an SNP
guest conte ...)
NOT-FOR-US: AMD
-CVE-2023-20518
- RESERVED
+CVE-2023-20518 (Incomplete cleanup in the ASP may expose the Master Encryption
Key (ME ...)
+ TODO: check
CVE-2023-20517
RESERVED
CVE-2023-20516
@@ -142009,16 +142319,16 @@ CVE-2023-20515
RESERVED
CVE-2023-20514
RESERVED
-CVE-2023-20513
- RESERVED
-CVE-2023-20512
- RESERVED
+CVE-2023-20513 (An insufficient bounds check in PMFW (Power Management
Firmware) may a ...)
+ TODO: check
+CVE-2023-20512 (A hardcoded AES key in PMFW may result in a privileged
attacker gain ...)
+ TODO: check
CVE-2023-20511
RESERVED
-CVE-2023-20510
- RESERVED
-CVE-2023-20509
- RESERVED
+CVE-2023-20510 (An insufficient DRAM address validation in PMFW may allow a
privileged ...)
+ TODO: check
+CVE-2023-20509 (An insufficient DRAM address validation in PMFW may allow a
privileged ...)
+ TODO: check
CVE-2023-20508
RESERVED
CVE-2023-20507
@@ -187141,8 +187451,8 @@ CVE-2021-46774 (Insufficient DRAM address validation
in System Management Unit (
NOT-FOR-US: AMD
CVE-2021-46773 (Insufficient input validation in ABL may enable a privileged
attacker ...)
NOT-FOR-US: AMD
-CVE-2021-46772
- RESERVED
+CVE-2021-46772 (Insufficient input validation in the ABL may allow a
privileged attack ...)
+ TODO: check
CVE-2021-46771 (Insufficient validation of addresses in AMD Secure Processor
(ASP) fir ...)
NOT-FOR-US: AMD
CVE-2021-46770
@@ -187193,8 +187503,8 @@ CVE-2021-46748 (Insufficient bounds checking in the
ASP (AMD Secure Processor) m
NOT-FOR-US: AMD
CVE-2021-46747
RESERVED
-CVE-2021-46746
- RESERVED
+CVE-2021-46746 (Lack of stack protection exploit mechanisms in ASP Secure OS
Trusted E ...)
+ TODO: check
CVE-2021-46745
RESERVED
CVE-2021-46744 (An attacker with access to a malicious hypervisor may be able
to infer ...)
@@ -189537,8 +189847,8 @@ CVE-2022-27488 (A cross-site request forgery (CSRF)
in Fortinet FortiVoiceEnterp
NOT-FOR-US: FortiGuard
CVE-2022-27487 (A improper privilege management in Fortinet FortiSandbox
version 4.2.0 ...)
NOT-FOR-US: Fortinet
-CVE-2022-27486
- RESERVED
+CVE-2022-27486 (A improper neutralization of special elements used in an os
command (' ...)
+ TODO: check
CVE-2022-27485 (A improper neutralization of special elements used in an sql
command ( ...)
NOT-FOR-US: Fortinet
CVE-2022-27484 (A unverified password change in Fortinet FortiADC version
6.2.0 throug ...)
@@ -201367,12 +201677,12 @@ CVE-2022-23819
RESERVED
CVE-2022-23818 (Insufficient input validation on the model specific register:
VM_HSAVE ...)
NOT-FOR-US: AMD
-CVE-2022-23817
- RESERVED
+CVE-2022-23817 (Insufficient checking of memory buffer in ASP Secure OS may
allow an a ...)
+ TODO: check
CVE-2022-23816
REJECTED
-CVE-2022-23815
- RESERVED
+CVE-2022-23815 (Improper bounds checking in APCB firmware may allow an
attacker to per ...)
+ TODO: check
CVE-2022-23814 (Failure to validate addresses provided by software to BIOS
commands ma ...)
NOT-FOR-US: AMD
CVE-2022-23813 (The software interfaces to ASP and SMU may not enforce the SNP
memory ...)
@@ -263299,8 +263609,8 @@ CVE-2021-26389
RESERVED
CVE-2021-26388 (Improper validation of the BIOS directory may allow for
searches to re ...)
NOT-FOR-US: AMD
-CVE-2021-26387
- RESERVED
+CVE-2021-26387 (Insufficient access controls in ASP kernel may allow a
privileged atta ...)
+ TODO: check
CVE-2021-26386 (A malicious or compromised UApp or ABL may be used by an
attacker to i ...)
NOT-FOR-US: AMD
CVE-2021-26385
@@ -263339,8 +263649,8 @@ CVE-2021-26369 (A malicious or compromised UApp or
ABL may be used by an attacke
NOT-FOR-US: AMD
CVE-2021-26368 (Insufficient check of the process type in Trusted OS (TOS) may
allow a ...)
NOT-FOR-US: AMD
-CVE-2021-26367
- RESERVED
+CVE-2021-26367 (A malicious attacker in x86 can misconfigure the Trusted
Memory Region ...)
+ TODO: check
CVE-2021-26366 (An attacker, who gained elevated privileges via some other
vulnerabili ...)
NOT-FOR-US: AMD
CVE-2021-26365 (Certain size values in firmware binary headers could trigger
out of bo ...)
@@ -263386,8 +263696,8 @@ CVE-2021-26346 (Failure to validate the integer
operand in ASP (AMD Secure Proce
NOTE:
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1031
CVE-2021-26345 (Failure to validate the value in APCB may allow a privileged
attacker ...)
NOT-FOR-US: AMD
-CVE-2021-26344
- RESERVED
+CVE-2021-26344 (An out of bounds memory write when processing the AMD PSP1
Configurati ...)
+ TODO: check
CVE-2021-26343 (Insufficient validation in ASP BIOS and DRTM commands may
allow malici ...)
NOT-FOR-US: AMD
CVE-2021-26342 (In SEV guest VMs, the CPU may fail to flush the Translation
Lookaside ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/00a4ba725c779e84e1f3baf5bc967f491b96090c
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/00a4ba725c779e84e1f3baf5bc967f491b96090c
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits