[Git][security-tracker-team/security-tracker][master] NFUs
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Mon Mar 4 10:51:27 GMT 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c30dda8b by Moritz Muehlenhoff at 2024-03-04T11:50:59+01:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -21,57 +21,57 @@ CVE-2024-21826 (in OpenHarmony v3.2.4 and prior versions allow a local attacker
CVE-2024-21816 (in OpenHarmony v4.0.0 and prior versions allow a local attacker cause ...)
NOT-FOR-US: OpenHarmony
CVE-2024-20038 (In pq, there is a possible out of bounds read due to an incorrect boun ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20037 (In pq, there is a possible write-what-where condition due to an incorr ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20036 (In vdec, there is a possible permission bypass due to a permissions by ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20034 (In battery, there is a possible escalation of privilege due to a missi ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20033 (In nvram, there is a possible information disclosure due to a missing ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20032 (In aee, there is a possible permission bypass due to a missing permiss ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20031 (In da, there is a possible out of bounds write due to lack of valudati ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20030 (In da, there is a possible information disclosure due to improper inpu ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20029 (In wlan firmware, there is a possible out of bounds write due to impro ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20028 (In da, there is a possible out of bounds write due to lack of valudati ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20027 (In da, there is a possible out of bounds write due to improper input v ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20026 (In da, there is a possible information disclosure due to improper inpu ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20025 (In da, there is a possible out of bounds write due to an integer overf ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20024 (In flashc, there is a possible out of bounds write due to lack of valu ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20023 (In flashc, there is a possible out of bounds write due to lack of valu ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20022 (In lk, there is a possible escalation of privilege due to a missing bo ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20020 (In OPTEE, there is a possible out of bounds write due to an incorrect ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20019 (In wlan driver, there is a possible memory leak due to improper input ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20018 (In wlan driver, there is a possible out of bounds write due to imprope ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20017 (In wlan service, there is a possible out of bounds write due to improp ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2024-20005 (In da, there is a possible permission bypass due to a missing permissi ...)
- TODO: check
+ NOT-FOR-US: MediaTek
CVE-2023-4479 (Stored XSS Vulnerability in M-Files Web versions before 23.8 allows at ...)
- TODO: check
+ NOT-FOR-US: M-Files Web
CVE-2023-49602 (in OpenHarmony v3.2.4 and prior versions allow a local attacker cause ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2023-46708 (in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitr ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2023-25176 (in OpenHarmony v3.2.4 and prior versions allow a local attacker cause ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2019-25210 (An issue was discovered in Cloud Native Computing Foundation (CNCF) He ...)
- TODO: check
+ - helm-kubernetes <itp> (bug #910799)
CVE-2024-26622 (In the Linux kernel, the following vulnerability has been resolved: t ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815 (6.8-rc7)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c30dda8b322d2d70ad80b9389a76ab0759f147ab
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c30dda8b322d2d70ad80b9389a76ab0759f147ab
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240304/0b3ecb6d/attachment.htm>
More information about the debian-security-tracker-commits
mailing list