[Git][security-tracker-team/security-tracker][master] bugnums

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Feb 28 14:49:34 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
428e67d0 by Moritz Muehlenhoff at 2024-02-28T15:49:06+01:00
bugnums

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -546,7 +546,7 @@ CVE-2024-26471 (A reflected cross-site scripting (XSS) vulnerability in zhimengz
 CVE-2024-26470 (A host header injection vulnerability in the forgot password function  ...)
 	NOT-FOR-US: FullStackHero's WebAPI Boilerplate
 CVE-2024-26464 (net-snmp 5.9.4 contains a memory leak vulnerability in /net-snmp/apps/ ...)
-	- net-snmp <unfixed>
+	- net-snmp <unfixed> (bug #1064968)
 	NOTE: https://github.com/LuMingYinDetect/net-snmp_defects/blob/main/net-snmp_detect_1.md
 CVE-2024-26143 (Rails is a web-application framework. There is a possible XSS vulnerab ...)
 	- rails <not-affected> (Vulnerable code not present)
@@ -578,7 +578,7 @@ CVE-2024-24323 (SQL injection vulnerability in linlinjava litemall v.1.8.0 allow
 CVE-2024-22251 (VMware Workstation and Fusion contain an out-of-bounds read vulnerabil ...)
 	NOT-FOR-US: VMware
 CVE-2024-21742 (Improper input validation allows for header injection in MIME4J librar ...)
-	- apache-mime4j <unfixed>
+	- apache-mime4j <unfixed> (bug #1064966)
 	[bookworm] - apache-mime4j <no-dsa> (Minor issue)
 	[bullseye] - apache-mime4j <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2024/02/27/5
@@ -906,17 +906,14 @@ CVE-2024-26466 (A DOM based cross-site scripting (XSS) vulnerability in the comp
 CVE-2024-26465 (A DOM based cross-site scripting (XSS) vulnerability in the component  ...)
 	NOT-FOR-US: beep.js
 CVE-2024-26462 (Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in / ...)
-	- krb5 <unfixed>
+	- krb5 <unfixed> (bug #1064965)
 	NOTE: https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
-	TODO: check, unclear upstream report status
 CVE-2024-26461 (Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in / ...)
-	- krb5 <unfixed>
+	- krb5 <unfixed> (bug #1064965)
 	NOTE: https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
-	TODO: check, unclear upstream report status
 CVE-2024-26458 (Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/r ...)
-	- krb5 <unfixed>
+	- krb5 <unfixed> (bug #1064965)
 	NOTE: https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
-	NOTE: check, unclear upstream report status
 CVE-2024-26455 (fluent-bit 2.2.2 contains a Use-After-Free vulnerability in /fluent-bi ...)
 	NOT-FOR-US: Fluent Bit
 CVE-2024-25925 (Unrestricted Upload of File with Dangerous Type vulnerability in SYSBA ...)
@@ -945,11 +942,11 @@ CVE-2024-25410 (flusity-CMS 2.33 is vulnerable to Unrestricted Upload of File wi
 CVE-2024-25344 (Cross Site Scripting vulnerability in ITFlow.org before commit v.43248 ...)
 	NOT-FOR-US: ITFlow.org
 CVE-2024-25082 (Splinefont in FontForge through 20230101 allows command injection via  ...)
-	- fontforge <unfixed>
+	- fontforge <unfixed> (bug #1064967)
 	NOTE: https://github.com/fontforge/fontforge/pull/5367
 	NOTE: https://github.com/fontforge/fontforge/commit/216eb14b558df344b206bf82e2bdaf03a1f2f429
 CVE-2024-25081 (Splinefont in FontForge through 20230101 allows command injection via  ...)
-	- fontforge <unfixed>
+	- fontforge <unfixed> (bug #1064967)
 	NOTE: https://github.com/fontforge/fontforge/pull/5367
 	NOTE: https://github.com/fontforge/fontforge/commit/216eb14b558df344b206bf82e2bdaf03a1f2f429
 CVE-2024-24714 (Unrestricted Upload of File with Dangerous Type vulnerability in bPlug ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/428e67d081211dac256fed6c3f20f773242bf585

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/428e67d081211dac256fed6c3f20f773242bf585
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240228/e3b98988/attachment.htm>


More information about the debian-security-tracker-commits mailing list