[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Aug 22 09:12:12 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
6f5018de by security tracker role at 2024-08-22T08:11:52+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,234 +1,278 @@
-CVE-2022-48943 [KVM: x86/mmu: make apf token non-zero to fix bug]
+CVE-2024-8072 (Mage AI allows remote unauthenticated attackers to leak the terminal s ...)
+	TODO: check
+CVE-2024-8071 (Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 a ...)
+	TODO: check
+CVE-2024-7836 (The Themify Builder plugin for WordPress is vulnerable to unauthorized ...)
+	TODO: check
+CVE-2024-7384 (The AcyMailing \u2013 An Ultimate Newsletter Plugin and Marketing Auto ...)
+	TODO: check
+CVE-2024-6386 (The WPML plugin for WordPress is vulnerable to Remote Code Execution i ...)
+	TODO: check
+CVE-2024-5583 (The The Plus Addons for Elementor \u2013 Elementor Addons, Page Templa ...)
+	TODO: check
+CVE-2024-45169 (An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2 ...)
+	TODO: check
+CVE-2024-45168 (An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2 ...)
+	TODO: check
+CVE-2024-45167 (An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2 ...)
+	TODO: check
+CVE-2024-45166 (An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2 ...)
+	TODO: check
+CVE-2024-45165 (An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2 ...)
+	TODO: check
+CVE-2024-45163 (The Mirai botnet through 2024-08-19 mishandles simultaneous TCP connec ...)
+	TODO: check
+CVE-2024-43813 (Mattermost versions 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 fail to enforce p ...)
+	TODO: check
+CVE-2024-43033 (JPress through 5.1.1 on Windows has an arbitrary file upload vulnerabi ...)
+	TODO: check
+CVE-2024-42411 (Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0,  ...)
+	TODO: check
+CVE-2024-42056 (Retool (self-hosted enterprise) through 3.40.0 inserts resource authen ...)
+	TODO: check
+CVE-2024-40886 (Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0,  ...)
+	TODO: check
+CVE-2024-39836 (Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 a ...)
+	TODO: check
+CVE-2024-39810 (Mattermost versions 9.5.x <= 9.5.7 and 9.10.x <= 9.10.0 fail to time l ...)
+	TODO: check
+CVE-2024-39576 (Dell Power Manager (DPM), versions 3.15.0 and prior, contains an Incor ...)
+	TODO: check
+CVE-2024-32939 (Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0,  ...)
+	TODO: check
+CVE-2024-28987 (The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded ...)
+	TODO: check
+CVE-2022-48943 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/6f3c1fc53d86d580d8d6d749c4af23705e4f6f79 (5.17-rc6)
-CVE-2022-48942 [hwmon: Handle failure to register sensor with thermal zone correctly]
+CVE-2022-48942 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/1b5f517cca36292076d9e38fa6e33a257703e62e (5.17-rc6)
-CVE-2022-48941 [ice: fix concurrent reset and removal of VFs]
+CVE-2022-48941 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fadead80fe4c033b5e514fcbadd20b55c4494112 (5.17-rc6)
-CVE-2022-48940 [bpf: Fix crash due to incorrect copy_map_value]
+CVE-2022-48940 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.16.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a8abb0c3dc1e28454851a00f8b7333d9695d566c (5.17-rc6)
-CVE-2022-48939 [bpf: Add schedule points in batch ops]
+CVE-2022-48939 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/75134f16e7dd0007aa474b281935c5f42e79f2c8 (5.17-rc6)
-CVE-2022-48938 [CDC-NCM: avoid overflow in sanity checking]
+CVE-2022-48938 (In the Linux kernel, the following vulnerability has been resolved:  C ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/8d2b1a1ec9f559d30b724877da4ce592edc41fdc (5.17-rc5)
-CVE-2022-48937 [io_uring: add a schedule point in io_add_buffers()]
+CVE-2022-48937 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/f240762f88b4b1b58561939ffd44837759756477 (5.17-rc6)
-CVE-2022-48936 [gso: do not skip outer ip header in case of ipip and net_failover]
+CVE-2022-48936 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/cc20cced0598d9a5ff91ae4ab147b3b5e99ee819 (5.17-rc6)
-CVE-2022-48935 [netfilter: nf_tables: unregister flowtable hooks on netns exit]
+CVE-2022-48935 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/6069da443bf65f513bb507bb21e2f87cfb1ad0b6 (5.17-rc6)
-CVE-2022-48934 [nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()]
+CVE-2022-48934 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/3a14d0888eb4b0045884126acc69abfb7b87814d (5.17-rc6)
-CVE-2022-48933 [netfilter: nf_tables: fix memory leak during stateful obj update]
+CVE-2022-48933 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/dad3bdeef45f81a6e90204bcc85360bb76eccec7 (5.17-rc6)
-CVE-2022-48932 [net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte]
+CVE-2022-48932 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0aec12d97b2036af0946e3d582144739860ac07b (5.17-rc6)
-CVE-2022-48931 [configfs: fix a race in configfs_{,un}register_subsystem()]
+CVE-2022-48931 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/84ec758fb2daa236026506868c8796b0500c047d (5.17-rc6)
-CVE-2022-48930 [RDMA/ib_srp: Fix a deadlock]
+CVE-2022-48930 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/081bdc9fe05bb23248f5effb6f811da3da4b8252 (5.17-rc6)
-CVE-2022-48929 [bpf: Fix crash due to out of bounds access into reg2btf_ids.]
+CVE-2022-48929 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.16.12-1
 	NOTE: https://git.kernel.org/linus/45ce4b4f9009102cd9f581196d480a59208690c1 (5.17-rc6)
-CVE-2022-48928 [iio: adc: men_z188_adc: Fix a resource leak in an error handling path]
+CVE-2022-48928 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/e0a2e37f303828d030a83f33ffe14b36cb88d563 (5.17-rc6)
-CVE-2022-48927 [iio: adc: tsc2046: fix memory corruption by preventing array overflow]
+CVE-2022-48927 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b7a78a8adaa8849c02f174d707aead0f85dca0da (5.17-rc6)
-CVE-2022-48926 [usb: gadget: rndis: add spinlock for rndis response list]
+CVE-2022-48926 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/aaaba1c86d04dac8e49bf508b492f81506257da3 (5.17-rc6)
-CVE-2022-48925 [RDMA/cma: Do not change route.addr.src_addr outside state checks]
+CVE-2022-48925 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/22e9f71072fa605cbf033158db58e0790101928d (5.17-rc6)
-CVE-2022-48924 [thermal: int340x: fix memory leak in int3400_notify()]
+CVE-2022-48924 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/3abea10e6a8f0e7804ed4c124bea2d15aca977c8 (5.17-rc6)
-CVE-2022-48923 [btrfs: prevent copying too big compressed lzo segment]
+CVE-2022-48923 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.16.12-1
 	NOTE: https://git.kernel.org/linus/741b23a970a79d5d3a1db2d64fa2c7b375a4febb (5.17-rc6)
-CVE-2022-48922 [riscv: fix oops caused by irqsoff latency tracer]
+CVE-2022-48922 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/22e2100b1b07d6f5acc71cc1acb53f680c677d77 (5.17-rc6)
-CVE-2022-48921 [sched/fair: Fix fault in reweight_entity]
+CVE-2022-48921 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.140-1
 	NOTE: https://git.kernel.org/linus/13765de8148f71fa795e0a6607de37c49ea5915a (5.17-rc4)
-CVE-2022-48920 [btrfs: get rid of warning on transaction commit when using flushoncommit]
+CVE-2022-48920 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.16.14-1
 	NOTE: https://git.kernel.org/linus/a0f0cf8341e34e5d2265bfd3a7ad68342da1e2aa (5.17-rc5)
-CVE-2022-48919 [cifs: fix double free race when mount fails in cifs_get_root()]
+CVE-2022-48919 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/3d6cc9898efdfb062efb74dc18cfc700e082f5d5 (5.17-rc5)
-CVE-2022-48918 [iwlwifi: mvm: check debugfs_dir ptr before use]
+CVE-2022-48918 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.14-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5a6248c0a22352f09ea041665d3bd3e18f6f872c (5.17-rc7)
-CVE-2022-48917 [ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min]
+CVE-2022-48917 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/9bdd10d57a8807dba0003af0325191f3cec0f11c (5.17-rc7)
-CVE-2022-48916 [iommu/vt-d: Fix double list_add when enabling VMD in scalable mode]
+CVE-2022-48916 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.14-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b00833768e170a31af09268f7ab96aecfcca9623 (5.17-rc7)
-CVE-2022-48915 [thermal: core: Fix TZ_GET_TRIP NULL pointer dereference]
+CVE-2022-48915 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/5838a14832d447990827d85e90afe17e6fb9c175 (5.17-rc7)
-CVE-2022-48914 [xen/netfront: destroy queues before real_num_tx_queues is zeroed]
+CVE-2022-48914 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/dcf4ff7a48e7598e6b10126cc02177abb8ae4f3f (5.17-rc7)
-CVE-2022-48913 [blktrace: fix use after free for struct blk_trace]
+CVE-2022-48913 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.16.14-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/30939293262eb433c960c4532a0d59c4073b2b84 (5.17-rc7)
-CVE-2022-48912 [netfilter: fix use-after-free in __nf_register_net_hook()]
+CVE-2022-48912 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/56763f12b0f02706576a088e85ef856deacc98a0 (5.17-rc7)
-CVE-2022-48911 [netfilter: nf_queue: fix possible use-after-free]
+CVE-2022-48911 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/c3873070247d9e3c7a6b0cf9bf9b45e8018427b1 (5.17-rc7)
-CVE-2022-48910 [net: ipv6: ensure we call ipv6_mc_down() at most once]
+CVE-2022-48910 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/9995b408f17ff8c7f11bc725c8aa225ba3a63b1c (5.17-rc7)
-CVE-2022-48909 [net/smc: fix connection leak]
+CVE-2022-48909 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/9f1c50cf39167ff71dc5953a3234f3f6eeb8fcb5 (5.17-rc7)
-CVE-2022-48908 [net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()]
+CVE-2022-48908 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/bd6f1fd5d33dfe5d1b4f2502d3694a7cc13f166d (5.17-rc7)
-CVE-2022-48907 [auxdisplay: lcd2s: Fix memory leak in ->remove()]
+CVE-2022-48907 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 5.16.14-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/898c0a15425a5bcaa8d44bd436eae5afd2483796 (5.17-rc7)
-CVE-2022-48906 [mptcp: Correctly set DATA_FIN timeout when number of retransmits is large]
+CVE-2022-48906 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.16.14-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/877d11f0332cd2160e19e3313e262754c321fa36 (5.17-rc7)
-CVE-2022-48905 [ibmvnic: free reset-work-item when flushing]
+CVE-2022-48905 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.14-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/8d0657f39f487d904fca713e0bc39c2707382553 (5.17-rc7)
-CVE-2022-48904 [iommu/amd: Fix I/O page table memory leak]
+CVE-2022-48904 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.14-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6b0b2d9a6a308bcd9300c2d83000a82812c56cea (5.17-rc7)
-CVE-2022-48903 [btrfs: fix relocation crash due to premature return from btrfs_commit_transaction()]
+CVE-2022-48903 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.16.14-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5fd76bf31ccfecc06e2e6b29f8c809e934085b99 (5.17-rc7)
-CVE-2022-48902 [btrfs: do not WARN_ON() if we have PageError set]
+CVE-2022-48902 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.16.14-1
 	NOTE: https://git.kernel.org/linus/a50e1fcbc9b85fd4e95b89a75c0884cb032a3e06 (5.17-rc7)
-CVE-2022-48901 [btrfs: do not start relocation until in progress drops are done]
+CVE-2022-48901 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.16.14-1
 	NOTE: https://git.kernel.org/linus/b4be6aefa73c9a6899ef3ba9c5faaa8a66e333ef (5.17-rc7)
 CVE-2022-48900
 	REJECTED
-CVE-2021-4441 [spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()]
+CVE-2021-4441 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.12-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/ab3824427b848da10e9fe2727f035bbeecae6ff4 (5.17-rc6)
-CVE-2024-8035
+CVE-2024-8035 (Inappropriate implementation in Extensions in Google Chrome on Windows ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-8034
+CVE-2024-8034 (Inappropriate implementation in Custom Tabs in Google Chrome on Androi ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-8033
+CVE-2024-8033 (Inappropriate implementation in WebApp Installs in Google Chrome on Wi ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7981
+CVE-2024-7981 (Inappropriate implementation in Views in Google Chrome prior to 128.0. ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7980
+CVE-2024-7980 (Insufficient data validation in Installer in Google Chrome on Windows  ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7979
+CVE-2024-7979 (Insufficient data validation in Installer in Google Chrome on Windows  ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7978
+CVE-2024-7978 (Insufficient policy enforcement in Data Transfer in Google Chrome prio ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7977
+CVE-2024-7977 (Insufficient data validation in Installer in Google Chrome on Windows  ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7976
+CVE-2024-7976 (Inappropriate implementation in FedCM in Google Chrome prior to 128.0. ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7975
+CVE-2024-7975 (Inappropriate implementation in Permissions in Google Chrome prior to  ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7974
+CVE-2024-7974 (Insufficient data validation in V8 API in Google Chrome prior to 128.0 ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7973
+CVE-2024-7973 (Heap buffer overflow in PDFium in Google Chrome prior to 128.0.6613.84 ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7972
+CVE-2024-7972 (Inappropriate implementation in V8 in Google Chrome prior to 128.0.661 ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7971
+CVE-2024-7971 (Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7969
+CVE-2024-7969 (Type Confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7968
+CVE-2024-7968 (Use after free in Autofill in Google Chrome prior to 128.0.6613.84 all ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7967
+CVE-2024-7967 (Heap buffer overflow in Fonts in Google Chrome prior to 128.0.6613.84  ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7966
+CVE-2024-7966 (Out of bounds memory access in Skia in Google Chrome prior to 128.0.66 ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7965
+CVE-2024-7965 (Inappropriate implementation in V8 in Google Chrome prior to 128.0.661 ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-7964
+CVE-2024-7964 (Use after free in Passwords in Google Chrome on Android prior to 128.0 ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2024-7795 (Autel MaxiCharger AC Elite Business C50 AppAuthenExchangeRandomNum Sta ...)
@@ -51507,9 +51551,9 @@ CVE-2024-1788
 	REJECTED
 CVE-2024-0686
 	REJECTED
-CVE-2024-0156 (Dell Digital Delivery, versions prior to 5.0.86.0, contain a Buffer Ov ...)
+CVE-2024-0156 (Dell Digital Delivery, versions prior to 5.2.0.0, contain a Buffer Ove ...)
 	NOT-FOR-US: Dell
-CVE-2024-0155 (Dell Digital Delivery, versions prior to 5.0.86.0, contain a Use After ...)
+CVE-2024-0155 (Dell Digital Delivery, versions prior to 5.2.0.0, contain a Use After  ...)
 	NOT-FOR-US: Dell
 CVE-2023-6241 (Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm ...)
 	NOT-FOR-US: Arm



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6f5018decec96a6b6fc6e26ff967e1033a71a1bb

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6f5018decec96a6b6fc6e26ff967e1033a71a1bb
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240822/9dd1b912/attachment.htm>


More information about the debian-security-tracker-commits mailing list