[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Sun Oct 22 21:31:25 BST 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
a1ea755c by Moritz Muehlenhoff at 2023-10-22T22:31:01+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,11 +1,11 @@
 CVE-2023-46306 (The web administration interface in NetModule Router Software (NRSW) 4 ...)
-	TODO: check
+	NOT-FOR-US: NetModule Router Software
 CVE-2023-46303 (link_to_local_path in ebooks/conversion/plugins/html_input.py in calib ...)
 	TODO: check
 CVE-2021-46898 (views/switch.py in django-grappelli (aka Django Grappelli) before 2.15 ...)
-	TODO: check
+	NOT-FOR-US: Django Grappelli
 CVE-2021-46897 (views.py in Wagtail CRX CodeRed Extensions (formerly CodeRed CMS or co ...)
-	TODO: check
+	NOT-FOR-US: Wagtail CRX CodeRed Extensions
 CVE-2023-XXXX [SQUID-2023:5 Denial of Service in FTP]
 	- squid <unfixed>
 	[bullseye] - squid <not-affected> (Vulnerable code not present)
@@ -71,7 +71,7 @@ CVE-2023-46301 (iTerm2 before 3.4.20 allow (potentially remote) code execution b
 CVE-2023-46300 (iTerm2 before 3.4.20 allow (potentially remote) code execution because ...)
 	NOT-FOR-US: iTerm2
 CVE-2023-46298 (Next.js before 13.4.20-canary.13 lacks a cache-control header and thus ...)
-	TODO: check
+	NOT-FOR-US: Next.js
 CVE-2023-46078 (Cross-Site Request Forgery (CSRF) vulnerability in PluginEver WC Seria ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2023-46067 (Cross-Site Request Forgery (CSRF) vulnerability in Qwerty23 Rocket Fon ...)
@@ -580,7 +580,7 @@ CVE-2023-45814 (Bunkum is an open-source protocol-agnostic request server for cu
 CVE-2023-45813 (Torbot is an open source tor network intelligence tool. In affected ve ...)
 	NOT-FOR-US: Torbot
 CVE-2023-45812 (The Apollo Router is a configurable, high-performance graph router wri ...)
-	TODO: check
+	NOT-FOR-US: Apollo Router
 CVE-2023-45146 (XXL-RPC is a high performance, distributed RPC framework. With it, a T ...)
 	NOT-FOR-US: XXL-RPC
 CVE-2023-45145 (Redis is an in-memory database that persists on disk. On startup, Redi ...)
@@ -622,7 +622,7 @@ CVE-2023-5631 (Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6
 	- roundcube 1.6.4+dfsg-1 (bug #1054079)
 	NOTE: https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d (1.6.4)
 CVE-2023-4601 (A stack-based buffer overflow vulnerability exists in NI System Config ...)
-	TODO: check
+	NOT-FOR-US: NI System Configuration
 CVE-2023-46009 (gifsicle-1.94 was found to have a floating point exception (FPE) vulne ...)
 	- gifsicle <unfixed> (unimportant)
 	NOTE: https://github.com/kohler/gifsicle/issues/196
@@ -769,7 +769,7 @@ CVE-2023-38552 (When the Node.js policy feature checks the integrity of a resour
 	NOTE: https://nodejs.org/en/blog/vulnerability/october-2023-security-releases#integrity-checks-according-to-policies-can-be-circumvented-medium---cve-2023-38552
 	NOTE: https://github.com/nodejs/node/commit/1c538938ccadfd35fbc699d8e85102736cd5945c
 CVE-2023-36321 (Connected Vehicle Systems Alliance (COVESA) up to v2.18.8 was discover ...)
-	TODO: check
+	NOT-FOR-US: COVESA
 CVE-2023-35084 (Unsafe Deserialization of User Input could lead to Execution of Unauth ...)
 	NOT-FOR-US: Ivanti
 CVE-2023-35083 (Allows an authenticated attacker with network access to read arbitrary ...)
@@ -65882,7 +65882,7 @@ CVE-2023-20600
 CVE-2023-20599
 	RESERVED
 CVE-2023-20598 (An improper privilege management in the AMD Radeon\u2122Graphics drive ...)
-	TODO: check
+	NOT-FOR-US: AMD
 CVE-2023-20597 (Improper initialization of variables in the DXE driver may allow a pri ...)
 	NOT-FOR-US: AMD
 CVE-2023-20596



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a1ea755ce2ff09ce431e9466d9d67d2ca27bc207

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a1ea755ce2ff09ce431e9466d9d67d2ca27bc207
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231022/127e75ee/attachment.htm>


More information about the debian-security-tracker-commits mailing list