Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
c5b15d49 by Moritz Muehlenhoff at 2024-11-29T17:25:39+01:00
bugnums
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -250,7 +250,7 @@ CVE-2024-11738
NOTE: https://rustsec.org/advisories/RUSTSEC-2024-0399.html
NOTE: https://github.com/rustls/rustls/issues/2227
CVE-2024-53920 (In elisp-mode.el in GNU Emacs through 30.0.92, a user who
chooses to i ...)
- - emacs <unfixed>
+ - emacs <unfixed> (bug #1088690)
[bookworm] - emacs <postponed> (Minor issue, revisit when fixed
upstream)
NOTE:
https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html
NOTE:
https://yhetil.org/emacs/CAFXAjY5f4YfHAtZur1RAqH34UbYU56_t6t2Er0YEh1Sb7-W=hg%40mail.gmail.com/
@@ -279,28 +279,28 @@ CVE-2024-46055 (OpenVidReview 1.0 is vulnerable to Cross
Site Scripting (XSS) in
CVE-2024-46054 (OpenVidReview 1.0 is vulnerable to Incorrect Access Control.
The /uplo ...)
NOT-FOR-US: OpenVidReview
CVE-2024-42333 (The researcher is showing that it is possible to leak a small
amount o ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: https://support.zabbix.com/browse/ZBX-25629
CVE-2024-42332 (The researcher is showing that due to the way the SNMP trap
log is par ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: https://support.zabbix.com/browse/ZBX-25628
CVE-2024-42331 (In the src/libs/zbxembed/browser.c file, the es_browser_ctor
method re ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: https://support.zabbix.com/browse/ZBX-25627
CVE-2024-42330 (The HttpRequest object allows to get the HTTP headers from the
server' ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: https://support.zabbix.com/browse/ZBX-25626
CVE-2024-42329 (The webdriver for the Browser object expects an error object
to be ini ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: ttps://support.zabbix.com/browse/ZBX-25625
CVE-2024-42328 (When the webdriver for the Browser object downloads data from
a HTTP s ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: https://support.zabbix.com/browse/ZBX-25624
CVE-2024-42327 (A non-admin user account on the Zabbix frontend with the
default User ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: https://support.zabbix.com/browse/ZBX-25623
CVE-2024-42326 (There was discovered a use after free bug in browser.c in the
es_brows ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: https://support.zabbix.com/browse/ZBX-25622
CVE-2024-41126 (Contiki-NG is an open-source, cross-platform operating system
for IoT ...)
NOT-FOR-US: Contiki-NG
@@ -309,10 +309,10 @@ CVE-2024-41125 (Contiki-NG is an open-source,
cross-platform operating system fo
CVE-2024-37816 (Quectel EC25-EUX EC25EUXGAR08A05M1G was discovered to contain
a stack ...)
NOT-FOR-US: Quectel
CVE-2024-36468 (The reported vulnerability is a stack buffer overflow in the
zbx_snmp_ ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: https://support.zabbix.com/browse/ZBX-25621
CVE-2024-36464 (When exporting media types, the password is exported in the
YAML in pl ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: https://support.zabbix.com/browse/ZBX-25630
CVE-2024-31976 (EnGenius EWS356-FIR 1.1.30 and earlier devices allow a remote
attacker ...)
NOT-FOR-US: EnGenius EWS356-FIR
@@ -362,7 +362,7 @@ CVE-2024-50942 (qiwen-file v1.4.0 was discovered to contain
a SQL injection vuln
CVE-2024-43784 (lakeFS is an open-source tool that transforms object storage
into a Gi ...)
NOT-FOR-US: lakeFS
CVE-2024-36467 (An authenticated user with API access (e.g.: user with default
User ro ...)
- - zabbix <unfixed>
+ - zabbix <unfixed> (bug #1088688)
NOTE: https://support.zabbix.com/browse/ZBX-25614
CVE-2024-11820 (A vulnerability, which was classified as problematic, has been
found i ...)
NOT-FOR-US: code-projects Crud Operation System
@@ -2308,32 +2308,32 @@ CVE-2024-11477 (7-Zip Zstandard Decompression Integer
Underflow Remote Code Exec
NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1532/
CVE-2024-11233 (In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26,
8.3.* before ...)
{DSA-5819-1}
- - php8.2 <unfixed>
+ - php8.2 <unfixed> (bug #1088688)
- php7.4 <removed>
NOTE:
https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
NOTE:
https://github.com/php/php-src/commit/a6c84cd7efd7eaaaefd4463412508df570d35358
(php-8.2.26)
CVE-2024-11234 (In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26,
8.3.* before ...)
{DSA-5819-1}
- - php8.2 <unfixed>
+ - php8.2 <unfixed> (bug #1088688)
- php7.4 <removed>
NOTE:
https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2
NOTE:
https://github.com/php/php-src/commit/cf6700e86d6357420a7c8386da63d48fec55f633
(php-8.2.26)
CVE-2024-11236 (In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26,
8.3.* before ...)
{DSA-5819-1}
- - php8.2 <unfixed>
+ - php8.2 <unfixed> (bug #1088688)
- php7.4 <removed>
NOTE:
https://github.com/php/php-src/security/advisories/GHSA-5hqh-c84r-qjcv
NOTE:
https://github.com/php/php-src/commit/7742f79a8a9c20522dbf40e1dc1d4ccad71d399c
(php-8.2.26)
NOTE:
https://github.com/php/php-src/commit/2dbe1425c5768faea2aa7bca26081dd208c94ac8
(php-8.2.26)
CVE-2024-8929 (In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.*
before ...)
{DSA-5819-1}
- - php8.2 <unfixed>
+ - php8.2 <unfixed> (bug #1088688)
- php7.4 <removed>
NOTE:
https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678
NOTE:
https://github.com/php/php-src/commit/6c0e2eb2f839d066924c164f65f17d1261529334
(php-8.2.26)
CVE-2024-8932 (In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.*
before ...)
{DSA-5819-1}
- - php8.2 <unfixed>
+ - php8.2 <unfixed> (bug #1088688)
- php7.4 <removed>
NOTE:
https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff
NOTE:
https://github.com/php/php-src/commit/90c851a8b1dc409d074ab369acbfd318bc8aea4e
(php-8.2.26)
@@ -4315,7 +4315,7 @@ CVE-2024-10571 (The Chartify \u2013 WordPress Chart
Plugin plugin for WordPress
CVE-2024-10979 (Incorrect control of environment variables in PostgreSQL
PL/Perl allow ...)
{DSA-5812-1 DLA-3954-1}
- postgresql-17 17.1-1
- - postgresql-16 <unfixed>
+ - postgresql-16 <unfixed> (bug #1088687)
- postgresql-15 <removed>
- postgresql-13 <removed>
NOTE: https://www.postgresql.org/support/security/CVE-2024-10979/
@@ -4340,7 +4340,7 @@ CVE-2024-10979 (Incorrect control of environment
variables in PostgreSQL PL/Perl
CVE-2024-10978 (Incorrect privilege assignment in PostgreSQL allows a
less-privileged ...)
{DSA-5812-1 DLA-3954-1}
- postgresql-17 17.1-1
- - postgresql-16 <unfixed>
+ - postgresql-16 <unfixed> (bug #1088687)
- postgresql-15 <removed>
- postgresql-13 <removed>
NOTE: https://www.postgresql.org/support/security/CVE-2024-10978/
@@ -4365,7 +4365,7 @@ CVE-2024-10978 (Incorrect privilege assignment in
PostgreSQL allows a less-privi
CVE-2024-10977 (Client use of server error message in PostgreSQL allows a
server not t ...)
{DSA-5812-1 DLA-3954-1}
- postgresql-17 17.1-1
- - postgresql-16 <unfixed>
+ - postgresql-16 <unfixed> (bug #1088687)
- postgresql-15 <removed>
- postgresql-13 <removed>
NOTE: https://www.postgresql.org/support/security/CVE-2024-10977/
@@ -4378,7 +4378,7 @@ CVE-2024-10977 (Client use of server error message in
PostgreSQL allows a server
CVE-2024-10976 (Incomplete tracking in PostgreSQL of tables with row security
allows a ...)
{DSA-5812-1 DLA-3954-1}
- postgresql-17 17.1-1
- - postgresql-16 <unfixed>
+ - postgresql-16 <unfixed> (bug #1088687)
- postgresql-15 <removed>
- postgresql-13 <removed>
NOTE: https://www.postgresql.org/support/security/CVE-2024-10976/
@@ -8993,7 +8993,7 @@ CVE-2024-48272 (D-Link DSL6740C v6.TR069.20211230 was
discovered to use an insec
CVE-2024-48271 (D-Link DSL6740C v6.TR069.20211230 was discovered to use
insecure defau ...)
NOT-FOR-US: D-Link
CVE-2024-48241 (An issue in radare2 v5.8.0 through v5.9.4 allows a local
attacker to c ...)
- - radare2 <unfixed>
+ - radare2 <unfixed> (bug #1088693)
NOTE: https://github.com/radareorg/radare2/issues/23317
NOTE: https://github.com/radareorg/radare2/pull/23318
NOTE: Fixed by:
https://github.com/radareorg/radare2/commit/b2a467cd13c561042554901313ebdcb749eb0de7
(5.9.6)
@@ -10129,12 +10129,12 @@ CVE-2024-50614 (TinyXML2 through 10.0.0 has a
reachable assertion for UINT_MAX/1
[bullseye] - tinyxml2 <postponed> (Minor issue, revisit when fixed
upstream)
NOTE: https://github.com/leethomason/tinyxml2/issues/996
CVE-2024-50613 (libsndfile through 1.2.2 has a reachable assertion, that may
lead to a ...)
- - libsndfile <unfixed>
+ - libsndfile <unfixed> (bug #1088691)
[bookworm] - libsndfile <postponed> (Minor issue, revisit when fixed
upstream)
[bullseye] - libsndfile <postponed> (Minor issue, revisit when fixed
upstream)
NOTE: https://github.com/libsndfile/libsndfile/issues/1034
CVE-2024-50612 (libsndfile through 1.2.2 has an ogg_vorbis.c
vorbis_analysis_wrote out ...)
- - libsndfile <unfixed>
+ - libsndfile <unfixed> (bug #1088692)
[bookworm] - libsndfile <postponed> (Minor issue, revisit when fixed
upstream)
[bullseye] - libsndfile <postponed> (Minor issue, CLI DoS)
NOTE: https://github.com/libsndfile/libsndfile/issues/1035
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5b15d490ca076bd68644ed4dc555f1866c5cc33
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5b15d490ca076bd68644ed4dc555f1866c5cc33
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits