[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Aug 12 21:12:47 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
dc6e688a by security tracker role at 2024-08-12T20:12:28+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,127 @@
+CVE-2024-7700 (A command injection flaw was found in the "Host Init Config" template  ...)
+	TODO: check
+CVE-2024-7697 (Logical vulnerability in the mobile application (com.transsion.carlcar ...)
+	TODO: check
+CVE-2024-6917 (Improper Neutralization of Special Elements used in an OS Command ('OS ...)
+	TODO: check
+CVE-2024-6768 (A Denial of Service in CLFS.sys in Microsoft Windows 10, Windows 11, W ...)
+	TODO: check
+CVE-2024-6758 (Improper Privilege ManagementinSprecher Automation SPRECON-E below ver ...)
+	TODO: check
+CVE-2024-6684 (Authentication Bypass Using an Alternate Path or Channel vulnerability ...)
+	TODO: check
+CVE-2024-6639 (The MDx theme for WordPress is vulnerable to Stored Cross-Site Scripti ...)
+	TODO: check
+CVE-2024-42748 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi. ...)
+	TODO: check
+CVE-2024-42747 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi. ...)
+	TODO: check
+CVE-2024-42745 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi. ...)
+	TODO: check
+CVE-2024-42744 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi. ...)
+	TODO: check
+CVE-2024-42743 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi. ...)
+	TODO: check
+CVE-2024-42742 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi. ...)
+	TODO: check
+CVE-2024-42741 (In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi. ...)
+	TODO: check
+CVE-2024-42632 (FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery  ...)
+	TODO: check
+CVE-2024-42631 (FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery  ...)
+	TODO: check
+CVE-2024-42630 (FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery  ...)
+	TODO: check
+CVE-2024-42629 (FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery  ...)
+	TODO: check
+CVE-2024-42628 (FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery  ...)
+	TODO: check
+CVE-2024-42627 (FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery  ...)
+	TODO: check
+CVE-2024-42626 (FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery  ...)
+	TODO: check
+CVE-2024-42625 (FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery  ...)
+	TODO: check
+CVE-2024-42624 (FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery  ...)
+	TODO: check
+CVE-2024-42623 (FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery  ...)
+	TODO: check
+CVE-2024-42547 (TOTOLINK A3100R V4.1.2cu.5050_B20200504 has a buffer overflow vulnerab ...)
+	TODO: check
+CVE-2024-42546 (TOTOLINK A3100R V4.1.2cu.5050_B20200504 has a buffer overflow vulnerab ...)
+	TODO: check
+CVE-2024-42545 (TOTOLINK A3700R v9.1.2u.5822_B20200513 has a buffer overflow vulnerabi ...)
+	TODO: check
+CVE-2024-42543 (TOTOLINK A3700R v9.1.2u.5822_B20200513 has a buffer overflow vulnerabi ...)
+	TODO: check
+CVE-2024-42520 (TOTOLINK A3002R v4.0.0-B20230531.1404 contains a buffer overflow vulne ...)
+	TODO: check
+CVE-2024-42489 (Pro Macros provides XWiki rendering macros. Missing escaping in the Vi ...)
+	TODO: check
+CVE-2024-42485 (Filament Excel enables excel export for Filament admin resources. The  ...)
+	TODO: check
+CVE-2024-42482 (fish-shop/syntax-check is a GitHub action for syntax checking fish she ...)
+	TODO: check
+CVE-2024-42481 (Skyport Daemon (skyportd) is the daemon for the Skyport Panel. By maki ...)
+	TODO: check
+CVE-2024-42480 (Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions ...)
+	TODO: check
+CVE-2024-42479 (llama.cpp provides LLM inference in C/C++. The unsafe `data` pointer m ...)
+	TODO: check
+CVE-2024-42478 (llama.cpp provides LLM inference in C/C++. The unsafe `data` pointer m ...)
+	TODO: check
+CVE-2024-42477 (llama.cpp provides LLM inference in C/C++. The unsafe `type` member in ...)
+	TODO: check
+CVE-2024-42474 (Streamlit is a data oriented application development framework for pyt ...)
+	TODO: check
+CVE-2024-42167 (The function "generate_app_certificates" in controllers/saml2/saml2.js ...)
+	TODO: check
+CVE-2024-42166 (The function "generate_app_certificates" in lib/app_certificates.js of ...)
+	TODO: check
+CVE-2024-42165 (Insufficiently random values for generating activation token in FIWARE ...)
+	TODO: check
+CVE-2024-42164 (Insufficiently random values for generating password reset token in FI ...)
+	TODO: check
+CVE-2024-42163 (Insufficiently random values for generating password reset token in FI ...)
+	TODO: check
+CVE-2024-41909 (Like many other SSH implementations, Apache MINA SSHD suffered from th ...)
+	TODO: check
+CVE-2024-41710 (A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Serie ...)
+	TODO: check
+CVE-2024-41651 (An issue in Prestashop v.8.1.7 and before allows a remote attacker to  ...)
+	TODO: check
+CVE-2024-41475 (Gnuboard g6 6.0.7 is vulnerable to Session hijacking due to a CORS mis ...)
+	TODO: check
+CVE-2024-40893 (Multiple authenticated operating system (OS) command injection vulnera ...)
+	TODO: check
+CVE-2024-40892 (A weak credential vulnerability exists in Firewalla Box Software versi ...)
+	TODO: check
+CVE-2024-40500 (Cross Site Scripting vulnerability in Martin Kucej i-librarian v.5.11. ...)
+	TODO: check
+CVE-2024-39091 (An OS command injection vulnerability in the ccm_debug component of MI ...)
+	TODO: check
+CVE-2024-38530 (The Open eClass platform (formerly known as GUnet eClass) is a complet ...)
+	TODO: check
+CVE-2024-36877 (Micro-Star International Z-series motherboards (Z590, Z490, and Z790)  ...)
+	TODO: check
+CVE-2024-33536 (An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. Th ...)
+	TODO: check
+CVE-2024-33535 (An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. Th ...)
+	TODO: check
+CVE-2024-33533 (An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0, is ...)
+	TODO: check
+CVE-2024-27443 (An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A  ...)
+	TODO: check
+CVE-2024-27442 (An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. Th ...)
+	TODO: check
+CVE-2024-21550 (SteVe is an open platform that implements different version of the OCP ...)
+	TODO: check
+CVE-2023-7249 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2023-48171 (An issue in OWASP DefectDojo before v.1.5.3.1 allows a remote attacker ...)
+	TODO: check
+CVE-2023-41884 (ZoneMinder is a free, open source Closed-circuit television software a ...)
+	TODO: check
 CVE-2024-7694 (ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the ...)
 	NOT-FOR-US: ThreatSonar Anti-Ransomware
 CVE-2024-7693 (Raiden MAILD Remote Management System from Team Johnlong Software has  ...)
@@ -634,6 +758,7 @@ CVE-2024-42248 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/acd09ac253b5de8fd79fc61a482ee19154914c7a (6.10)
 CVE-2024-42247 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/948f991c62a4018fb81d85804eeab3029c6209f8 (6.10)
 CVE-2024-42246 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -644,6 +769,7 @@ CVE-2024-42245 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2feab2492deb2f14f9675dd6388e9e2bf669c27a (6.10)
 CVE-2024-42244 (In the Linux kernel, the following vulnerability has been resolved:  U ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/c15a688e49987385baa8804bf65d570e362f8576 (6.10)
 CVE-2024-42243 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
@@ -676,6 +802,7 @@ CVE-2024-42237 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6598afa9320b6ab13041616950ca5f8f938c0cf1 (6.10)
 CVE-2024-42236 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/6d3c721e686ea6c59e18289b400cc95c76e927e0 (6.10)
 CVE-2024-42235 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
@@ -694,6 +821,7 @@ CVE-2024-42233 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/24be02a42181f0707be0498045c4c4b13273b16d (6.10)
 CVE-2024-42232 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/69c7b2fe4c9cc1d3b1186d1c5606627ecf0de883 (6.10)
 CVE-2024-6494 (The WordPress File Upload WordPress plugin before 4.24.8 does not prop ...)
@@ -1395,7 +1523,7 @@ CVE-2024-6472 (Certificate Validation user interface in LibreOffice allows poten
 	NOTE: https://github.com/LibreOffice/core/commit/ee0373b18001dd876eb855e495b59cec0f128f97 (distro/mimo/7-4)
 	NOTE: https://github.com/LibreOffice/core/commit/2587dbff640e2443f0800f9c1a865723500de1c5 (distro/mimo/7-0)
 	NOTE: https://github.com/LibreOffice/core/commit/b8c9ba427e23e45ef782d6a144f4415cae3c9b13 (distro/mimo/6-2)
-CVE-2024-42010 (mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allo ...)
+CVE-2024-42010 (mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 insu ...)
 	{DSA-5743-1}
 	- roundcube 1.6.8+dfsg-1 (bug #1077969)
 	NOTE: https://github.com/roundcube/roundcubemail/commit/602d0f566eb39b6dcb739ad78323ec434a3b92ce
@@ -2371,6 +2499,7 @@ CVE-2024-42230 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/21a741eb75f80397e5f7d3739e24d7d75e619011 (6.10-rc7)
 CVE-2024-42229 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/23e4099bdc3c8381992f9eb975c79196d6755210 (6.10-rc1)
@@ -2387,10 +2516,12 @@ CVE-2024-42225 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/7f819a2f4fbc510e088b49c79addcf1734503578 (6.10-rc1)
 CVE-2024-42224 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/4c7f3950a9fd53a62b156c0fe7c3a2c43b0ba19b (6.10-rc1)
 CVE-2024-42223 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/1aa1329a67cc214c3b7bd2a14d1301a795760b07 (6.10-rc1)
@@ -2398,6 +2529,7 @@ CVE-2024-42162 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/af9bcf910b1f86244f39e15e701b2dc564b469a6 (6.10-rc1)
 CVE-2024-42161 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/009367099eb61a4fc2af44d4eb06b6b4de7de6db (6.10-rc1)
@@ -2413,6 +2545,7 @@ CVE-2024-42158 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/22e6824622e8a8889df0f8fc4ed5aea0e702a694 (6.10-rc1)
 CVE-2024-42157 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/1d8c270de5eb74245d72325d285894a577a945d9 (6.10-rc1)
@@ -2423,14 +2556,17 @@ CVE-2024-42155 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/f2ebdadd85af4f4d0cae1e5d009c70eccc78c207 (6.10-rc1)
 CVE-2024-42154 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/66be40e622e177316ae81717aa30057ba9e61dff (6.10-rc7)
 CVE-2024-42153 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/f63b94be6942ba82c55343e196bd09b53227618e (6.10-rc7)
 CVE-2024-42152 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/c758b77d4a0a0ed3a1292b3fd7a2aeccd1a169a4 (6.10-rc2)
@@ -2448,6 +2584,7 @@ CVE-2024-42149 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2ae4db5647d807efb6a87c09efaa6d1db9c905d7 (6.10-rc7)
 CVE-2024-42148 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/134061163ee5ca4759de5c24ca3bd71608891ba7 (6.10-rc7)
@@ -2459,6 +2596,7 @@ CVE-2024-42146 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/f9116f658a6217b101e3b4e89f845775b6fb05d9 (6.10-rc1)
 CVE-2024-42145 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/ca0b44e20a6f3032224599f02e7c8fb49525c894 (6.10-rc1)
@@ -2466,6 +2604,7 @@ CVE-2024-42144 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/a1191a77351e25ddf091bb1a231cae12ee598b5d (6.10-rc1)
 CVE-2024-42143 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/53e4efa470d5fc6a96662d2d3322cfc925818517 (6.10-rc1)
@@ -2494,6 +2633,7 @@ CVE-2024-42138 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8ce34dccbe8fa7d2ef86f2d8e7db2a9b67cabfc3 (6.10-rc7)
 CVE-2024-42137 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/88e72239ead9814b886db54fc4ee39ef3c2b8f26 (6.10-rc7)
@@ -2518,6 +2658,7 @@ CVE-2024-42132 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1cc18c2ab2e8c54c355ea7c0423a636e415a0c23 (6.10-rc7)
 CVE-2024-42131 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/385d838df280eba6c8680f9777bfa0d0bfe7e8b2 (6.10-rc7)
@@ -2532,6 +2673,7 @@ CVE-2024-42128 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/c382e2e3eccb6b7ca8c7aff5092c1668428e7de6 (6.10-rc1)
 CVE-2024-42127 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/a6683c690bbfd1f371510cb051e8fa49507f3f5e (6.10-rc1)
@@ -2543,6 +2685,7 @@ CVE-2024-42125 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/bb38626f3f97e16e6d368a9ff6daf320f3fe31d9 (6.10-rc1)
 CVE-2024-42124 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec (6.10-rc1)
@@ -2553,14 +2696,17 @@ CVE-2024-42122 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/8e65a1b7118acf6af96449e1e66b7adbc9396912 (6.10-rc1)
 CVE-2024-42121 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/59d99deb330af206a4541db0c4da8f73880fba03 (6.10-rc1)
 CVE-2024-42120 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/5396a70e8cf462ec5ccf2dc8de103c79de9489e6 (6.10-rc1)
 CVE-2024-42119 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/1357b2165d9ad94faa4c4a20d5e2ce29c2ff29c3 (6.10-rc1)
@@ -2575,6 +2721,7 @@ CVE-2024-42116 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/86167183a17e03ec77198897975e9fdfbd53cb0b (6.10-rc1)
 CVE-2024-42115 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/af9a8730ddb6a4b2edd779ccc0aceb994d616830 (6.10-rc1)
@@ -2615,14 +2762,17 @@ CVE-2024-42107 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/996422e3230e41468f652d754fefd1bdbcd4604e (6.10-rc7)
 CVE-2024-42106 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/61cf1c739f08190a4cbf047b9fbb192a94d87e3f (6.10-rc7)
 CVE-2024-42105 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/e2fec219a36e0993642844be0f345513507031f4 (6.10-rc7)
 CVE-2024-42104 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/bb76c6c274683c8570ad788f79d4b875bde0e458 (6.10-rc7)
@@ -2632,10 +2782,12 @@ CVE-2024-42103 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/48f091fd50b2eb33ae5eaea9ed3c4f81603acf38 (6.10-rc7)
 CVE-2024-42102 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/30139c702048f1097342a31302cbd3d478f50c63 (6.10-rc7)
 CVE-2024-42101 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/80bec6825b19d95ccdfd3393cf8ec15ff2a749b4 (6.10-rc7)
@@ -3167,6 +3319,7 @@ CVE-2024-41082 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/7dc3bfcb4c9cc58970fff6aaa48172cb224d85aa (6.10-rc3)
 CVE-2024-41081 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DSA-5747-1}
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/cf28ff8e4c02e1ffa850755288ac954b6ff0db8c (6.10-rc3)
 CVE-2024-41080 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
@@ -3176,9 +3329,11 @@ CVE-2024-41079 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/cd0c1b8e045a8d2785342b385cb2684d9b48e426 (6.10-rc4)
 CVE-2024-41078 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-5747-1}
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/a7e4c6a3031c74078dba7fa36239d0f4fe476c53 (6.10-rc6)
 CVE-2024-41077 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5747-1}
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 (6.10-rc3)
 CVE-2024-41076 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
@@ -3194,18 +3349,21 @@ CVE-2024-41073 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/e5d574ab37f5f2e7937405613d9b1a724811e5ad (6.10-rc4)
 CVE-2024-41072 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DSA-5747-1}
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/6ef09cdc5ba0f93826c09d810c141a8d103a80fc (6.10-rc5)
 CVE-2024-41071 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 (6.10-rc5)
 CVE-2024-41070 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
+	{DSA-5747-1}
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/a986fa57fd81a1430e00b3c6cf8a325d6f894a63 (6.10-rc5)
 CVE-2024-41069 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1 (6.10-rc6)
 CVE-2024-41068 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DSA-5747-1}
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/6434b33faaa063df500af355ee6c3942e0f8d982 (6.10-rc6)
 CVE-2024-41067 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
@@ -3215,12 +3373,15 @@ CVE-2024-41066 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/0983d288caf984de0202c66641577b739caad561 (6.10-rc6)
 CVE-2024-41065 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DSA-5747-1}
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/1a14150e1656f7a332a943154fc486504db4d586 (6.10-rc7)
 CVE-2024-41064 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DSA-5747-1}
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/a1216e62d039bf63a539bbe718536ec789a853dd (6.10-rc7)
 CVE-2024-41063 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	{DSA-5747-1}
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/0d151a103775dd9645c78c97f77d6e2a5298d913 (6.10-rc7)
 CVE-2024-41062 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
@@ -3233,6 +3394,7 @@ CVE-2024-41060 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/6fb15dcbcf4f212930350eaee174bb60ed40a536 (6.10-rc7)
 CVE-2024-41059 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
+	{DSA-5747-1}
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/0570730c16307a72f8241df12363f76600baf57d (6.10)
 CVE-2024-41058 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
@@ -3248,6 +3410,7 @@ CVE-2024-41056 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/680e126ec0400f6daecf0510c5bb97a55779ff03 (6.10)
 CVE-2024-41055 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/82f0b6f041fad768c28b4ad05a683065412c226e (6.10)
 CVE-2024-41054 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
@@ -3274,6 +3437,7 @@ CVE-2024-41050 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/19f4f399091478c95947f6bd7ad61622300c30d9 (6.10)
 CVE-2024-41049 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92 (6.10)
 CVE-2024-41048 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
@@ -3284,6 +3448,7 @@ CVE-2024-41047 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/01fc5142ae6b06b61ed51a624f2732d6525d8ea3 (6.10)
 CVE-2024-41046 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/e1533b6319ab9c3a97dad314dd88b3783bc41b69 (6.10)
 CVE-2024-41045 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
@@ -3291,6 +3456,7 @@ CVE-2024-41045 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a6fcd19d7eac1335eb76bc16b6a66b7f574d1d69 (6.10)
 CVE-2024-41044 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/f2aeb7306a898e1cbd03963d376f4b6656ca2b55 (6.10)
 CVE-2024-41043 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -3302,9 +3468,11 @@ CVE-2024-41042 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/cff3bd012a9512ac5ed858d38e6ed65f6391008c (6.10)
 CVE-2024-41041 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/5c0b485a8c6116516f33925b9ce5b6104a6eadfd (6.10)
 CVE-2024-41040 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/26488172b0292bed837b95a006a3f3431d1898c3 (6.10)
 CVE-2024-41039 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
@@ -3324,9 +3492,11 @@ CVE-2024-41036 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/0913ec336a6c0c4a2b296bd9f74f8e41c4c83c8c (6.10)
 CVE-2024-41035 (In the Linux kernel, the following vulnerability has been resolved:  U ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/a368ecde8a5055b627749b09c6218ef793043e47 (6.10)
 CVE-2024-41034 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 (6.10)
 CVE-2024-41033 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
@@ -3377,6 +3547,7 @@ CVE-2024-41023 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/b58652db66c910c2245f5bee7deca41c12d707b9 (6.10)
 CVE-2024-41022 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DSA-5747-1}
 	- linux 6.9.12-1
 	NOTE: https://git.kernel.org/linus/6769a23697f17f9bf9365ca8ed62fe37e361a05a (6.11-rc1)
 CVE-2024-41021 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
@@ -3385,6 +3556,7 @@ CVE-2024-41021 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/df39038cd89525d465c2c8827eb64116873f141a (6.11-rc1)
 CVE-2024-41020 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	{DSA-5747-1}
 	- linux 6.9.12-1
 	NOTE: https://git.kernel.org/linus/f8138f2ad2f745b9a1c696a05b749eabe44337ea (6.11-rc1)
 CVE-2023-52887 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -3469,12 +3641,14 @@ CVE-2024-41018 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/702d4930eb06dcfda85a2fa67e8a1a27bfa2a845 (6.11-rc1)
 CVE-2024-41017 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
+	{DSA-5747-1}
 	- linux 6.9.12-1
 	NOTE: https://git.kernel.org/linus/d0fa70aca54c8643248e89061da23752506ec0d4 (6.11-rc1)
 CVE-2024-41016 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/af77c4fc1871847b528d58b7fdafb4aa1f6a9262 (6.11-rc1)
 CVE-2024-41015 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
+	{DSA-5747-1}
 	- linux 6.9.12-1
 	NOTE: https://git.kernel.org/linus/255547c6bb8940a97eea94ef9d464ea5967763fb (6.11-rc1)
 CVE-2024-41014 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
@@ -3880,9 +4054,11 @@ CVE-2024-41136 (An authenticated command injection vulnerability exists in the H
 CVE-2024-0231 (A resource misdirection vulnerability in GitLab CE/EE versions 12.0 pr ...)
 	- gitlab <unfixed>
 CVE-2024-41091 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	{DSA-5747-1}
 	- linux 6.9.12-1
 	NOTE: https://git.kernel.org/linus/049584807f1d797fc3078b68035450a9769eb5c3
 CVE-2024-41090 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	{DSA-5747-1}
 	- linux 6.9.12-1
 	NOTE: https://git.kernel.org/linus/ed7f2afdd0e043a397677e597ced0830b83ba0b3
 CVE-2024-6993
@@ -4197,6 +4373,7 @@ CVE-2024-6231 (The Request a Quote WordPress plugin before 2.4.1 does not saniti
 CVE-2024-4260 (The Page Builder Gutenberg Blocks  WordPress plugin before 3.1.12 does ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-41012 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	{DSA-5747-1}
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/3cad1bc010416c6dd780643476bc59ed742436b9 (6.10-rc7)
 CVE-2024-40502 (SQL injection vulnerability in Hospital Management System Project in A ...)
@@ -5406,6 +5583,7 @@ CVE-2024-41010 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1cb6f0bae50441f4b4b32a28315853b279c7404e (6.10)
 CVE-2024-41009 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-5747-1}
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/cfa1a2329a691ffd991fcf7248a57d752e712881 (6.10-rc6)
@@ -6039,6 +6217,7 @@ CVE-2024-27240 (Improper input validation in the installer for some Zoom Apps fo
 CVE-2024-27238 (Race condition in the installer for some Zoom Apps and SDKs for Window ...)
 	NOT-FOR-US: Zoom
 CVE-2024-41007 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	{DSA-5747-1}
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/97a9063518f198ec0adb2ecb89789de342bb8283 (6.10)
 CVE-2024-6744 (The SMTP Listener of Secure Email Gateway from Cellopoint does not pro ...)
@@ -6606,7 +6785,7 @@ CVE-2024-40948 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8bb592c2eca8fd2bc06db7d80b38da18da4a2f43 (6.10-rc5)
 CVE-2024-40947 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
-	{DSA-5731-1}
+	{DSA-5747-1 DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/9a95c5bfbf02a0a7f5983280fe284a0ff0836c34 (6.10-rc5)
 CVE-2024-40946
@@ -8290,7 +8469,7 @@ CVE-2024-6600 (Due to large allocation checks in Angle for GLSL shaders being to
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-30/#CVE-2024-6600
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-31/#CVE-2024-6600
 CVE-2024-39487 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
-	{DSA-5731-1}
+	{DSA-5747-1 DSA-5731-1}
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/e271ff53807e8f2c628758290f0e499dbe51cb3d (6.10-rc7)
 CVE-2024-6365 (The Product Table by WBW plugin for WordPress is vulnerable to Remote  ...)
@@ -11432,6 +11611,7 @@ CVE-2024-36489 (In the Linux kernel, the following vulnerability has been resolv
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/91e61dd7a0af660408e87372d8330ceb218be302 (6.10-rc1)
 CVE-2024-36484 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5747-1}
 	- linux 6.9.7-1
 	[bookworm] - linux 6.1.94-1
 	NOTE: https://git.kernel.org/linus/26afda78cda3da974fd4c287962c169e9462c495 (6.10-rc1)
@@ -17805,6 +17985,7 @@ CVE-2024-36939 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.94-1
 	NOTE: https://git.kernel.org/linus/24457f1be29f1e7042e50a7749f5c2dde8c433c8 (6.9-rc7)
 CVE-2024-36938 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-5747-1}
 	- linux 6.8.11-1
 	[bookworm] - linux 6.1.94-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
@@ -17972,6 +18153,7 @@ CVE-2024-36902 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.94-1
 	NOTE: https://git.kernel.org/linus/d101291b2681e5ab938554e3e323f7a7ee33e3aa (6.9)
 CVE-2024-36901 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DSA-5747-1}
 	- linux 6.8.11-1
 	[bookworm] - linux 6.1.94-1
 	NOTE: https://git.kernel.org/linus/4db783d68b9b39a411a96096c10828ff5dfada7a (6.9)
@@ -31845,6 +32027,7 @@ CVE-2022-48667 (In the Linux kernel, the following vulnerability has been resolv
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9c8b7a293f50253e694f19161c045817a938e551 (6.0-rc4)
 CVE-2022-48666 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DSA-5747-1}
 	- linux 6.0.2-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8fe4ce5836e932f5766317cb651c1ff2a4cd0506 (6.0-rc5)
@@ -48316,7 +48499,7 @@ CVE-2024-0968
 	REJECTED
 CVE-2024-0795 (If an attacked was given access to an instance with the admin or manag ...)
 	NOT-FOR-US: AnythingLLM
-CVE-2024-42258 [mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines]
+CVE-2024-42258 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.10.3-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d9592025000b3cf26c742f3505da7b83aedc26d5 (6.11-rc1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/dc6e688af9365d5c71332c19ca199ed7906dbc39

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/dc6e688af9365d5c71332c19ca199ed7906dbc39
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240812/ef864b5e/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list