Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6d7a5f7a by Moritz Muehlenhoff at 2024-12-23T09:29:10+01:00
"new" radare2 issue

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -696,7 +696,13 @@ CVE-2024-39703 (In ThreatQuotient ThreatQ before 5.29.3, 
authenticated users are
 CVE-2024-31668 (rizin before v0.6.3 is vulnerable to Improper Neutralization 
of Specia ...)
        NOT-FOR-US: rizin
 CVE-2024-29646 (Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 
allows an at ...)
-       TODO: check
+       - radare2 5.9.0+dfsg-1
+       NOTE: https://github.com/radareorg/radare2/pull/22562
+       NOTE: 
https://github.com/radareorg/radare2/commit/38c8e5ded67eed2c8a1f874e536d05fc3939fa29
 (5.9.0)
+       NOTE: 
https://github.com/radareorg/radare2/commit/098669591ca0327619fd2df572ca81d2dfe50ec0
 (5.9.0)
+       NOTE: 
https://github.com/radareorg/radare2/commit/c75ad89e5f4d1c53bb06f9c4dee174cc73aba30a
 (5.9.0)
+       NOTE: 
https://github.com/radareorg/radare2/commit/f368c8ccdb03af307d37f1c6899b94b25a0306c7
 (5.9.0)
+       NOTE: 
https://gist.github.com/Crispy-fried-chicken/0be4a204e7226fa2cea761c09f027690
 CVE-2024-21548 (Versions of the package bun before 1.1.30 are vulnerable to 
Prototype  ...)
        NOT-FOR-US: bun
 CVE-2024-21547 (Versions of the package spatie/browsershot before 5.0.2 are 
vulnerable ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6d7a5f7a2ddf441aac91ec5b0449b9d318f73441

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6d7a5f7a2ddf441aac91ec5b0449b9d318f73441
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to