[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Aug 14 18:27:58 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
fd37ad0c by Salvatore Bonaccorso at 2023-08-14T19:27:31+02:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -8,9 +8,9 @@ CVE-2023-40303 (GNU inetutils through 2.4 may allow privilege escalation because
CVE-2023-40296 (async-sockets-cpp through 0.3.1 has a stack-based buffer overflow in R ...)
TODO: check
CVE-2023-40295 (libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_strInit ...)
- TODO: check
+ NOT-FOR-US: libboron
CVE-2023-40294 (libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_parseBl ...)
- TODO: check
+ NOT-FOR-US: libboron
CVE-2023-40293 (Harman Infotainment 20190525031613 and later allows command injection ...)
NOT-FOR-US: Harman Infotainment
CVE-2023-40292 (Harman Infotainment 20190525031613 and later discloses the IP address ...)
@@ -23,79 +23,79 @@ CVE-2023-40283 (An issue was discovered in l2cap_sock_release in net/bluetooth/l
CVE-2023-40274 (An issue was discovered in zola 0.13.0 through 0.17.2. The custom impl ...)
TODO: check
CVE-2023-3267 (When adding a remote backup location, an authenticated user can pass a ...)
- TODO: check
+ NOT-FOR-US: Trellix
CVE-2023-3266 (A non-feature complete authentication mechanism exists in the producti ...)
- TODO: check
+ NOT-FOR-US: Trellix
CVE-2023-3265 (An authentication bypass exists on CyberPower PowerPanel Enterprise by ...)
- TODO: check
+ NOT-FOR-US: Trellix
CVE-2023-3264 (The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earl ...)
- TODO: check
+ NOT-FOR-US: Trellix
CVE-2023-3263 (The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earl ...)
- TODO: check
+ NOT-FOR-US: Trellix
CVE-2023-3262 (The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earl ...)
- TODO: check
+ NOT-FOR-US: Trellix
CVE-2023-3261 (When adding a remote backup location, an authenticated user can pass a ...)
- TODO: check
+ NOT-FOR-US: Trellix
CVE-2023-3260 (When adding a remote backup location, an authenticated user can pass a ...)
- TODO: check
+ NOT-FOR-US: Trellix
CVE-2023-3259 (The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earl ...)
- TODO: check
+ NOT-FOR-US: Trellix
CVE-2023-39406 (Permission control vulnerability in the XLayout component. Successful ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39405 (Vulnerability of out-of-bounds parameter read/write in the Wi-Fi modul ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39404 (Vulnerability of input parameter verification in certain APIs in the w ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39403 (Parameter verification vulnerability in the installd module. Successfu ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39402 (Parameter verification vulnerability in the installd module. Successfu ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39401 (Parameter verification vulnerability in the installd module. Successfu ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39400 (Parameter verification vulnerability in the installd module. Successfu ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39399 (Parameter verification vulnerability in the installd module. Successfu ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39398 (Parameter verification vulnerability in the installd module. Successfu ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39397 (Input parameter verification vulnerability in the communication system ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39396 (Deserialization vulnerability in the input module. Successful exploita ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39395 (Mismatch vulnerability in the serialization process in the communicati ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39394 (Vulnerability of API privilege escalation in the wifienhance module. S ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39393 (Vulnerability of insecure signatures in the ServiceWifiResources modul ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39392 (Vulnerability of insecure signatures in the OsuLogin module. Successfu ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39391 (Vulnerability of system file information leakage in the USB Service mo ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39390 (Vulnerability of input parameter verification in certain APIs in the w ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39389 (Vulnerability of input parameters being not strictly verified in the P ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39388 (Vulnerability of input parameters being not strictly verified in the P ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39387 (Vulnerability of permission control in the window management module. S ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39386 (Vulnerability of input parameters being not strictly verified in the P ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39385 (Vulnerability of configuration defects in the media module of certain ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39384 (Vulnerability of incomplete permission verification in the input metho ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39383 (Vulnerability of input parameters being not strictly verified in the A ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39382 (Input verification vulnerability in the audio module. Successful explo ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39381 (Input verification vulnerability in the storage module. Successful exp ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-39380 (Permission control vulnerability in the audio module. Successful explo ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2021-46895 (Vulnerability of defects introduced in the design process in the Multi ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2023-4265 (Potential buffer overflow vulnerabilities in the following locations: ...)
NOT-FOR-US: zephyr-rtos
CVE-2023-4293 (The Premium Packages - Sell Digital Products Securely plugin for WordP ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fd37ad0c8a45cfe728cf8ebb0b6f460c728f676c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fd37ad0c8a45cfe728cf8ebb0b6f460c728f676c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230814/3675eab5/attachment.htm>
More information about the debian-security-tracker-commits
mailing list