[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Oct 25 21:30:28 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
21b23d7e by Salvatore Bonaccorso at 2023-10-25T22:29:56+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2,117 +2,117 @@ CVE-2023-5717 (A heap out-of-bounds write vulnerability in the Linux kernel's Li
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/32671e3799ca2e4590773fd0e63aaa4229e50c06 (6.6-rc7)
 CVE-2023-5671 (HP Print and Scan Doctor for Windows may potentially be vulnerable to  ...)
-	TODO: check
+	NOT-FOR-US: HP
 CVE-2023-46564 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46563 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46562 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46560 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46559 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46558 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46557 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46556 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46555 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46554 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46553 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46552 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46551 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46550 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46549 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46548 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46547 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46546 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46545 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46544 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46543 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46542 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46541 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46540 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46539 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46538 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46537 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46536 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46535 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46534 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46527 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46526 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46525 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46523 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46522 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46521 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46520 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2023-46518 (Mercury A15 V1.0 20230818_1.0.3 was discovered to contain a command ex ...)
-	TODO: check
+	NOT-FOR-US: Mercury A15
 CVE-2023-46424 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46423 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46422 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46421 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46420 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46419 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46418 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46417 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46416 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46415 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46414 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46413 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46412 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46411 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46410 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46409 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46408 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2023-46396 (Audimex 15.0.0 is vulnerable to Cross Site Scripting (XSS) in /audimex ...)
 	TODO: check
 CVE-2023-46102 (The Android Client application, when enrolled to the AppHub server, co ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/21b23d7ea3c3d2a26788640e045e54c1b895ba16

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/21b23d7ea3c3d2a26788640e045e54c1b895ba16
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231025/e82a139e/attachment.htm>


More information about the debian-security-tracker-commits mailing list