[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Sep 7 09:12:40 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
df75550d by security tracker role at 2024-09-07T08:12:33+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,17 @@
+CVE-2024-8521 (A vulnerability, which was classified as problematic, was found in Wav ...)
+ TODO: check
+CVE-2024-8439
+ REJECTED
+CVE-2024-45771 (RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerabilit ...)
+ TODO: check
+CVE-2024-44845 (DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated ...)
+ TODO: check
+CVE-2024-44844 (DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated ...)
+ TODO: check
+CVE-2024-44839 (RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerabilit ...)
+ TODO: check
+CVE-2024-44838 (RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerabilit ...)
+ TODO: check
CVE-2024-8443
- opensc <unfixed>
[bookworm] - opensc <no-dsa> (Minor issue)
@@ -107,11 +121,11 @@ CVE-2023-34979 (An OS command injection vulnerability has been reported to affec
NOT-FOR-US: QNAP
CVE-2023-34974 (An OS command injection vulnerability has been reported to affect seve ...)
NOT-FOR-US: QNAP
-CVE-2024-45498
+CVE-2024-45498 (Example DAG: example_inlet_event_extra.py shipped with Apache Airflow ...)
- airflow <itp> (bug #819700)
-CVE-2024-45034
+CVE-2024-45034 (Apache Airflow versions before 2.10.1 have a vulnerability that allows ...)
- airflow <itp> (bug #819700)
-CVE-2024-34158
+CVE-2024-34158 (Calling Parse on a "// +build" build tag line with deeply nested expre ...)
- golang-1.23 <unfixed>
- golang-1.22 <unfixed>
- golang-1.21 <unfixed>
@@ -122,7 +136,7 @@ CVE-2024-34158
NOTE: https://go.dev/issue/69141
NOTE: https://github.com/golang/go/commit/032ac075c20c01c6c35a672d1542d3e98eab84ea (go1.23.1)
NOTE: https://github.com/golang/go/commit/d4c53812e6ce2ac368173d7fcd31d0ecfcffb002 (go1.22.7)
-CVE-2024-34156
+CVE-2024-34156 (Calling Decoder.Decode on a message which contains deeply nested struc ...)
- golang-1.23 <unfixed>
- golang-1.22 <unfixed>
- golang-1.21 <unfixed>
@@ -133,7 +147,7 @@ CVE-2024-34156
NOTE: https://go.dev/issue/69139
NOTE: https://github.com/golang/go/commit/fa8ff1a46deb6c816304441ec6740ec112e19012 (go1.23.1)
NOTE: https://github.com/golang/go/commit/2092294f2b097c5828f4eace6c98a322c1510b01 (go1.22.7)
-CVE-2024-34155
+CVE-2024-34155 (Calling any of the Parse functions on Go source code which contains de ...)
- golang-1.23 <unfixed>
- golang-1.22 <unfixed>
- golang-1.21 <unfixed>
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/df75550d9cd46dced8112ea4793a2e6396e1fafb
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/df75550d9cd46dced8112ea4793a2e6396e1fafb
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240907/cfc7a160/attachment.htm>
More information about the debian-security-tracker-commits
mailing list