[Git][security-tracker-team/security-tracker][master] new h2o issues
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Sat Oct 12 10:22:06 BST 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0e638ef3 by Moritz Muehlenhoff at 2024-10-12T11:21:45+02:00
new h2o issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -174,11 +174,16 @@ CVE-2024-46215 (A vulnerability was discovered in KM08-708H-v1.1, There is a buf
CVE-2024-46088 (An arbitrary file upload vulnerability in the ProductAction.entphone i ...)
NOT-FOR-US: Zhejiang University Entersoft Customer Resource Management System
CVE-2024-45403 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. Wh ...)
- TODO: check
+ - h2o <unfixed>
+ NOTE: https://github.com/h2o/h2o/security/advisories/GHSA-4xp5-3jhc-3m92
+ NOTE: https://github.com/h2o/h2o/commit/16b13eee8ad7895b4fe3fcbcabee53bd52782562
+ NOTE: https://github.com/h2o/h2o/commit/1ed32b23f999acf0c5029f09c8525f93eb1d354c
CVE-2024-45402 (Picotls is a TLS protocol library that allows users select different c ...)
- picotls <itp> (bug #925405)
CVE-2024-45397 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. Wh ...)
- TODO: check
+ - h2o <unfixed>
+ NOTE: https://github.com/h2o/h2o/security/advisories/GHSA-jf2c-xjcp-wg4c
+ NOTE: https://github.com/h2o/h2o/commit/15ed15a2efb83a77bb4baaa5a119e639c2f6898a
CVE-2024-45396 (Quicly is an IETF QUIC protocol implementation. Quicly up to commtit d ...)
NOT-FOR-US: Quicly
CVE-2024-45317 (A Server-Side Request Forgery (SSRF) vulnerability in SMA1000 applianc ...)
@@ -222,7 +227,10 @@ CVE-2024-33579 (A DLL hijack vulnerability was reported in Lenovo Baiying that c
CVE-2024-33578 (A DLL hijack vulnerability was reported in Lenovo Leyun that could all ...)
NOT-FOR-US: Lenovo
CVE-2024-25622 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. Th ...)
- TODO: check
+ - h2o <unfixed>
+ NOTE: https://github.com/h2o/h2o/security/advisories/GHSA-5m7v-cj65-h6pj
+ NOTE: https://github.com/h2o/h2o/issues/3332
+ NOTE: https://github.com/h2o/h2o/commit/123f5e2b65dcdba8f7ef659a00d24bd1249141be
CVE-2023-42133 (PAX Android based POS devices allow for escalation of privilege via im ...)
NOT-FOR-US: PAX Android based POS devices
CVE-2024-9779
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e638ef3971a19c06c859cfbee20fda5305f8871
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e638ef3971a19c06c859cfbee20fda5305f8871
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241012/2b646bd6/attachment.htm>
More information about the debian-security-tracker-commits
mailing list