[Git][security-tracker-team/security-tracker][master] NFUs
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Mon Feb 19 15:56:46 GMT 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
665fd4d0 by Moritz Muehlenhoff at 2024-02-19T16:56:11+01:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -19,9 +19,9 @@ CVE-2024-26327 (An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vf
- qemu <unfixed>
NOTE: https://lore.kernel.org/all/20240214-reuse-v4-5-89ad093a07f4%40daynix.com/
CVE-2024-26318 (Serenity before 6.8.0 allows XSS via an email link because LoginPage.t ...)
- TODO: check
+ NOT-FOR-US: Serenity
CVE-2024-24722 (An unquoted service path vulnerability in the 12d Synergy Server and F ...)
- TODO: check
+ NOT-FOR-US: 12d Synergy Server
CVE-2022-48624 (close_altfile in filename.c in less before 606 omits shell_quote calls ...)
- less <unfixed>
[bookworm] - less <no-dsa> (Minor issue)
@@ -71,23 +71,23 @@ CVE-2024-21984 (StorageGRID (formerly StorageGRID Webscale) versions prior to 11
CVE-2024-21983 (StorageGRID (formerly StorageGRID Webscale) versions prior to 11.8 ar ...)
NOT-FOR-US: StorageGRID
CVE-2024-21500 (All versions of the package github.com/greenpau/caddy-security are vul ...)
- TODO: check
+ NOT-FOR-US: caddy-security (addon for src:caddy)
CVE-2024-21499 (All versions of the package github.com/greenpau/caddy-security are vul ...)
- TODO: check
+ NOT-FOR-US: caddy-security (addon for src:caddy)
CVE-2024-21498 (All versions of the package github.com/greenpau/caddy-security are vul ...)
- TODO: check
+ NOT-FOR-US: caddy-security (addon for src:caddy)
CVE-2024-21497 (All versions of the package github.com/greenpau/caddy-security are vul ...)
- TODO: check
+ NOT-FOR-US: caddy-security (addon for src:caddy)
CVE-2024-21496 (All versions of the package github.com/greenpau/caddy-security are vul ...)
- TODO: check
+ NOT-FOR-US: caddy-security (addon for src:caddy)
CVE-2024-21495 (Versions of the package github.com/greenpau/caddy-security before 1.0. ...)
- TODO: check
+ NOT-FOR-US: caddy-security (addon for src:caddy)
CVE-2024-21494 (All versions of the package github.com/greenpau/caddy-security are vul ...)
- TODO: check
+ NOT-FOR-US: caddy-security (addon for src:caddy)
CVE-2024-21493 (All versions of the package github.com/greenpau/caddy-security are vul ...)
- TODO: check
+ NOT-FOR-US: caddy-security (addon for src:caddy)
CVE-2024-21492 (All versions of the package github.com/greenpau/caddy-security are vul ...)
- TODO: check
+ NOT-FOR-US: caddy-security (addon for src:caddy)
CVE-2024-20986 (Vulnerability in the Oracle WebLogic Server product of Oracle Fusion M ...)
NOT-FOR-US: Oracle
CVE-2024-20980 (Vulnerability in the Oracle BI Publisher product of Oracle Analytics ( ...)
@@ -143,11 +143,11 @@ CVE-2024-1512 (The MasterStudy LMS WordPress Plugin \u2013 for Online Courses an
CVE-2024-0610 (The Piraeus Bank WooCommerce Payment Gateway plugin for WordPress is v ...)
NOT-FOR-US: WordPress Plugin
CVE-2023-6749 (Unchecked length coming from user input in settings shell)
- TODO: check
+ NOT-FOR-US: Zephyr RTOS (unrelated to src:zephyr)
CVE-2023-6249 (Signed to unsigned conversion esp32_ipm_send)
- TODO: check
+ NOT-FOR-US: Zephyr RTOS (unrelated to src:zephyr)
CVE-2023-5779 (can: out of bounds in remove_rx_filter function)
- TODO: check
+ NOT-FOR-US: Zephyr RTOS (unrelated to src:zephyr)
CVE-2023-52387 (Resource reuse vulnerability in the GPU module. Successful exploitatio ...)
NOT-FOR-US: Huawei
CVE-2023-52381 (Script injection vulnerability in the email module.Successful exploita ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/665fd4d039f5e19870f0d0ba30d2a06551f23246
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/665fd4d039f5e19870f0d0ba30d2a06551f23246
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240219/c81e2470/attachment.htm>
More information about the debian-security-tracker-commits
mailing list