[Git][security-tracker-team/security-tracker][master] bugnums
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Feb 28 14:49:34 GMT 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
428e67d0 by Moritz Muehlenhoff at 2024-02-28T15:49:06+01:00
bugnums
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -546,7 +546,7 @@ CVE-2024-26471 (A reflected cross-site scripting (XSS) vulnerability in zhimengz
CVE-2024-26470 (A host header injection vulnerability in the forgot password function ...)
NOT-FOR-US: FullStackHero's WebAPI Boilerplate
CVE-2024-26464 (net-snmp 5.9.4 contains a memory leak vulnerability in /net-snmp/apps/ ...)
- - net-snmp <unfixed>
+ - net-snmp <unfixed> (bug #1064968)
NOTE: https://github.com/LuMingYinDetect/net-snmp_defects/blob/main/net-snmp_detect_1.md
CVE-2024-26143 (Rails is a web-application framework. There is a possible XSS vulnerab ...)
- rails <not-affected> (Vulnerable code not present)
@@ -578,7 +578,7 @@ CVE-2024-24323 (SQL injection vulnerability in linlinjava litemall v.1.8.0 allow
CVE-2024-22251 (VMware Workstation and Fusion contain an out-of-bounds read vulnerabil ...)
NOT-FOR-US: VMware
CVE-2024-21742 (Improper input validation allows for header injection in MIME4J librar ...)
- - apache-mime4j <unfixed>
+ - apache-mime4j <unfixed> (bug #1064966)
[bookworm] - apache-mime4j <no-dsa> (Minor issue)
[bullseye] - apache-mime4j <no-dsa> (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2024/02/27/5
@@ -906,17 +906,14 @@ CVE-2024-26466 (A DOM based cross-site scripting (XSS) vulnerability in the comp
CVE-2024-26465 (A DOM based cross-site scripting (XSS) vulnerability in the component ...)
NOT-FOR-US: beep.js
CVE-2024-26462 (Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in / ...)
- - krb5 <unfixed>
+ - krb5 <unfixed> (bug #1064965)
NOTE: https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
- TODO: check, unclear upstream report status
CVE-2024-26461 (Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in / ...)
- - krb5 <unfixed>
+ - krb5 <unfixed> (bug #1064965)
NOTE: https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
- TODO: check, unclear upstream report status
CVE-2024-26458 (Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/r ...)
- - krb5 <unfixed>
+ - krb5 <unfixed> (bug #1064965)
NOTE: https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
- NOTE: check, unclear upstream report status
CVE-2024-26455 (fluent-bit 2.2.2 contains a Use-After-Free vulnerability in /fluent-bi ...)
NOT-FOR-US: Fluent Bit
CVE-2024-25925 (Unrestricted Upload of File with Dangerous Type vulnerability in SYSBA ...)
@@ -945,11 +942,11 @@ CVE-2024-25410 (flusity-CMS 2.33 is vulnerable to Unrestricted Upload of File wi
CVE-2024-25344 (Cross Site Scripting vulnerability in ITFlow.org before commit v.43248 ...)
NOT-FOR-US: ITFlow.org
CVE-2024-25082 (Splinefont in FontForge through 20230101 allows command injection via ...)
- - fontforge <unfixed>
+ - fontforge <unfixed> (bug #1064967)
NOTE: https://github.com/fontforge/fontforge/pull/5367
NOTE: https://github.com/fontforge/fontforge/commit/216eb14b558df344b206bf82e2bdaf03a1f2f429
CVE-2024-25081 (Splinefont in FontForge through 20230101 allows command injection via ...)
- - fontforge <unfixed>
+ - fontforge <unfixed> (bug #1064967)
NOTE: https://github.com/fontforge/fontforge/pull/5367
NOTE: https://github.com/fontforge/fontforge/commit/216eb14b558df344b206bf82e2bdaf03a1f2f429
CVE-2024-24714 (Unrestricted Upload of File with Dangerous Type vulnerability in bPlug ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/428e67d081211dac256fed6c3f20f773242bf585
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/428e67d081211dac256fed6c3f20f773242bf585
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240228/e3b98988/attachment.htm>
More information about the debian-security-tracker-commits
mailing list