[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Jul 11 22:00:53 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
be06487e by security tracker role at 2024-07-11T20:12:26+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,107 @@
+CVE-2024-6681 (A vulnerability, which was classified as critical, has been found in w ...)
+	TODO: check
+CVE-2024-6680 (A vulnerability classified as critical was found in witmy my-springsec ...)
+	TODO: check
+CVE-2024-6679 (A vulnerability classified as critical has been found in witmy my-spri ...)
+	TODO: check
+CVE-2024-6643
+	REJECTED
+CVE-2024-6531 (A vulnerability has been identified in Bootstrap that exposes users to ...)
+	TODO: check
+CVE-2024-6528 (CWE-79: Improper Neutralization of Input During Web Page Generation (' ...)
+	TODO: check
+CVE-2024-6485 (A security vulnerability has been discovered in bootstrap that could e ...)
+	TODO: check
+CVE-2024-6484 (A vulnerability has been identified in Bootstrap that exposes users to ...)
+	TODO: check
+CVE-2024-6407 (CWE-200: Information Exposure vulnerability exists that could cause di ...)
+	TODO: check
+CVE-2024-6035 (A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbia ...)
+	TODO: check
+CVE-2024-5681 (CWE-20: Improper Input Validation vulnerability exists that could caus ...)
+	TODO: check
+CVE-2024-5680 (CWE-129: Improper Validation of Array Index vulnerability exists that  ...)
+	TODO: check
+CVE-2024-5679 (CWE-787: Out-of-Bounds Write vulnerability exists that could cause loc ...)
+	TODO: check
+CVE-2024-39905 (Red is a fully modular Discord bot. Due to a bug in Red's Core API, 3r ...)
+	TODO: check
+CVE-2024-39904 (VNote is a note-taking platform. Prior to 3.18.1, a code execution vul ...)
+	TODO: check
+CVE-2024-39553 (An Exposure of Resource to Wrong Sphere vulnerability in the sampling  ...)
+	TODO: check
+CVE-2024-39552 (An Improper Handling of Exceptional Conditions vulnerability in the ro ...)
+	TODO: check
+CVE-2024-39551 (An Uncontrolled Resource Consumption vulnerability in the H.323 ALG (A ...)
+	TODO: check
+CVE-2024-39550 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
+	TODO: check
+CVE-2024-39549 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
+	TODO: check
+CVE-2024-39548 (An Uncontrolled Resource Consumption vulnerability in the aftmand proc ...)
+	TODO: check
+CVE-2024-39546 (A Missing Authorization vulnerability in the Socket Intercept (SI) com ...)
+	TODO: check
+CVE-2024-39545 (An Improper Check for Unusual or Exceptional Conditions vulnerability  ...)
+	TODO: check
+CVE-2024-39543 (A Buffer Copy without Checking Size of Inputvulnerability in the routi ...)
+	TODO: check
+CVE-2024-39542 (An Improper Validation of Syntactic Correctness of Input vulnerability ...)
+	TODO: check
+CVE-2024-39541 (An Improper Handling of Exceptional Conditions vulnerability in the Ro ...)
+	TODO: check
+CVE-2024-39540 (An Improper Check for Unusual or Exceptional Conditions vulnerability  ...)
+	TODO: check
+CVE-2024-39539 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
+	TODO: check
+CVE-2024-39538 (A Buffer Copy without Checking Size of Input vulnerability in the PFE  ...)
+	TODO: check
+CVE-2024-39537 (An Improper Restriction of Communication Channel to Intended Endpoints ...)
+	TODO: check
+CVE-2024-39536 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
+	TODO: check
+CVE-2024-39535 (An Improper Check for Unusual or Exceptional Conditions vulnerability  ...)
+	TODO: check
+CVE-2024-39533 (An Unimplemented or Unsupported Feature in the UI vulnerability in Jun ...)
+	TODO: check
+CVE-2024-39532 (AnInsertion of Sensitive Information into Log File vulnerability in Ju ...)
+	TODO: check
+CVE-2024-39531 (An Improper Handling of Values vulnerability in the Packet Forwarding  ...)
+	TODO: check
+CVE-2024-39530 (An Improper Check for Unusual or Exceptional Conditions vulnerability  ...)
+	TODO: check
+CVE-2024-39529 (A Use of Externally-Controlled Format String vulnerability in the Pack ...)
+	TODO: check
+CVE-2024-39528 (A Use After Free vulnerability in the Routing Protocol Daemon (rpd) of ...)
+	TODO: check
+CVE-2024-39524 (An Improper Neutralization of Special Elements vulnerability in Junipe ...)
+	TODO: check
+CVE-2024-39523 (An Improper Neutralization of Special Elements vulnerability in Junipe ...)
+	TODO: check
+CVE-2024-39522 (An Improper Neutralization of Special Elements vulnerability in Junipe ...)
+	TODO: check
+CVE-2024-39521 (An Improper Neutralization of Special Elements vulnerability in Junipe ...)
+	TODO: check
+CVE-2024-39520 (AnImproper Neutralization of Special Elements vulnerability in Juniper ...)
+	TODO: check
+CVE-2024-39519 (An Improper Check for Unusual or Exceptional Conditions vulnerability  ...)
+	TODO: check
+CVE-2024-39317 (Wagtail is an open source content management system built on Django. A ...)
+	TODO: check
+CVE-2024-38536 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	TODO: check
+CVE-2024-38535 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	TODO: check
+CVE-2024-38534 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	TODO: check
+CVE-2024-37151 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	TODO: check
+CVE-2024-32753 (Under certain circumstances the camera may be susceptible to known vul ...)
+	TODO: check
+CVE-2024-2602 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory (' ...)
+	TODO: check
+CVE-2024-28872 (The TLS certificate validation code is flawed. An attacker can obtain  ...)
+	TODO: check
 CVE-2024-6676 (A vulnerability has been found in witmy my-springsecurity-plus up to 2 ...)
 	TODO: check
 CVE-2024-6666 (The WP ERP plugin for WordPress is vulnerable to SQL Injection via the ...)
@@ -2485,10 +2589,12 @@ CVE-2024-39884 (A regression in the core of Apache HTTP Server 2.4.60 ignores so
 	NOTE: Introduced by https://github.com/apache/httpd/commit/925b6f0ceb8983a11662b5f3a6f2fa75860c2cde
 	NOTE: Likely a regression during fix of CVE-2024-38476
 CVE-2024-39573 (Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier ...)
+	{DSA-5729-1}
 	- apache2 2.4.60-1
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573
 	NOTE: likely fix according to comment in code https://github.com/apache/httpd/commit/9494aa8d52e3c263bc0413b77ac8a73b0d524388
 CVE-2024-38477 (null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and ...)
+	{DSA-5729-1}
 	- apache2 2.4.60-1
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477
 	NOTE: Fixed by https://github.com/apache/httpd/commit/1d98d4db186e708f059336fb9342d0adb6925e85
@@ -2496,12 +2602,14 @@ CVE-2024-38477 (null pointer dereference in mod_proxy in Apache HTTP Server 2.4.
 	NOTE: Regression identified by Ubuntu https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/2072648
 	NOTE: Rgression fixed by https://github.com/apache/httpd/commit/4d3a308014be26e5407113b4c827a1ea2882bf38
 CVE-2024-38476 (Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vul ...)
+	{DSA-5729-1}
 	- apache2 2.4.60-1
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476
 	NOTE: Fixed by https://github.com/apache/httpd/commit/925b6f0ceb8983a11662b5f3a6f2fa75860c2cde
 	NOTE: (or https://svn.apache.org/viewvc?view=revision&revision=1918560)
 	NOTE: see also regression CVE-2024-39884
 CVE-2024-38475 (Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.5 ...)
+	{DSA-5729-1}
 	- apache2 2.4.60-1
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475
 	NOTE: same fix as CVE-2024-28474
@@ -2509,6 +2617,7 @@ CVE-2024-38475 (Improper escaping of output in mod_rewrite in Apache HTTP Server
 	NOTE: Need also log fix https://github.com/apache/httpd/commit/4797330ad813d9f8a2bb1b3b8d03ceb523dc4884
 	NOTE: (or https://svn.apache.org/viewvc?view=revision&revision=1918561)
 CVE-2024-38474 (Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.5 ...)
+	{DSA-5729-1}
 	- apache2 2.4.60-1
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474
 	NOTE: same fix as CVE-2024-28475
@@ -2516,6 +2625,7 @@ CVE-2024-38474 (Substitution encoding issue in mod_rewrite in Apache HTTP Server
 	NOTE: need also log fix https://github.com/apache/httpd/commit/4797330ad813d9f8a2bb1b3b8d03ceb523dc4884
 	NOTE: (or https://svn.apache.org/viewvc?view=revision&revision=1918561)
 CVE-2024-38473 (Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier ...)
+	{DSA-5729-1}
 	- apache2 2.4.60-1
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473
 	NOTE: https://github.com/apache/httpd/pull/457
@@ -2531,6 +2641,7 @@ CVE-2024-38472 (SSRF in Apache HTTP Server on Windows allows to potentially leak
 	NOTE: https://github.com/apache/httpd/commit/12542a80324b69ad6a1a489e1b697398551a5fe0
 	NOTE: Only affects Apache HTTP Server on Windows
 CVE-2024-36387 (Serving WebSocket protocol upgrades over a HTTP/2 connection could res ...)
+	{DSA-5729-1}
 	- apache2 2.4.60-1
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-36387
 	NOTE: https://github.com/apache/httpd/commit/c69a51bff8157e403121f8436d85dde21ad28bd2
@@ -7764,7 +7875,7 @@ CVE-2024-23518 (Missing Authorization vulnerability in Navneil Naicker ACF Photo
 	NOT-FOR-US: WordPress plugin
 CVE-2024-23503 (Missing Authorization vulnerability in WPManageNinja LLC Ninja Tables. ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2024-23111 (A use of password hash with insufficient computational effort vulnerab ...)
+CVE-2024-23111 (An improper neutralization of input during web page Generation ('Cross ...)
 	NOT-FOR-US: FortiGuard
 CVE-2024-23110 (A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 throug ...)
 	NOT-FOR-US: FortiGuard



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/be06487e71c5d9d65a362add2c90c9d6e0c27b67

-- 
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/be06487e71c5d9d65a362add2c90c9d6e0c27b67
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240711/c286835c/attachment.htm>


More information about the debian-security-tracker-commits mailing list