Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cf19a115 by Salvatore Bonaccorso at 2025-01-06T22:41:21+01:00
Add upstream tag information for some ofono upstream commits

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -39848,31 +39848,31 @@ CVE-2024-7547 (oFono SMS Decoder Stack-based Buffer 
Overflow Privilege Escalatio
        [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
        [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1087/
-       NOTE: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=305df050d02aea8532f7625d6642685aa530f9b0
+       NOTE: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=305df050d02aea8532f7625d6642685aa530f9b0
 (2.14)
 CVE-2024-7546 (oFono SimToolKit Heap-based Buffer Overflow Privilege 
Escalation Vulne ...)
        - ofono 2.14-1 (bug #1078555)
        [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
        [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1086/
-       NOTE: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=79ea6677669e50b0bb9c231765adb4f81c375f63
+       NOTE: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=79ea6677669e50b0bb9c231765adb4f81c375f63
 (2.14)
 CVE-2024-7545 (oFono SimToolKit Heap-based Buffer Overflow Privilege 
Escalation Vulne ...)
        - ofono 2.14-1 (bug #1078555)
        [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
        [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1085/
-       NOTE: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=556e14548c38c2b96d85881542046ee7ed750bb5
+       NOTE: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=556e14548c38c2b96d85881542046ee7ed750bb5
 (2.14)
 CVE-2024-7544 (oFono SimToolKit Heap-based Buffer Overflow Privilege 
Escalation Vulne ...)
        - ofono 2.14-1 (bug #1078555)
        [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
        [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1084/
-       NOTE: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=a240705a0d5d41eca6de4125ab2349ecde4c873a
+       NOTE: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=a240705a0d5d41eca6de4125ab2349ecde4c873a
 (2.14)
 CVE-2024-7543 (oFono SimToolKit Heap-based Buffer Overflow Privilege 
Escalation Vulne ...)
        - ofono 2.14-1 (bug #1078555)
        [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
        [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1083/
-       NOTE: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=90e60ada012de42964214d8155260f5749d0dcc7
+       NOTE: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=90e60ada012de42964214d8155260f5749d0dcc7
 (2.14)
 CVE-2024-7542 (oFono AT CMGR Command Uninitialized Variable Information 
Disclosure Vu ...)
        - ofono 2.14-1 (bug #1078555)
        [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cf19a11553536a926dd03d1c1767884994da2b55

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cf19a11553536a926dd03d1c1767884994da2b55
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to