[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Sep 7 09:12:40 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
df75550d by security tracker role at 2024-09-07T08:12:33+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,17 @@
+CVE-2024-8521 (A vulnerability, which was classified as problematic, was found in Wav ...)
+	TODO: check
+CVE-2024-8439
+	REJECTED
+CVE-2024-45771 (RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerabilit ...)
+	TODO: check
+CVE-2024-44845 (DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated  ...)
+	TODO: check
+CVE-2024-44844 (DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated  ...)
+	TODO: check
+CVE-2024-44839 (RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerabilit ...)
+	TODO: check
+CVE-2024-44838 (RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerabilit ...)
+	TODO: check
 CVE-2024-8443
 	- opensc <unfixed>
 	[bookworm] - opensc <no-dsa> (Minor issue)
@@ -107,11 +121,11 @@ CVE-2023-34979 (An OS command injection vulnerability has been reported to affec
 	NOT-FOR-US: QNAP
 CVE-2023-34974 (An OS command injection vulnerability has been reported to affect seve ...)
 	NOT-FOR-US: QNAP
-CVE-2024-45498
+CVE-2024-45498 (Example DAG: example_inlet_event_extra.py shipped with Apache Airflow  ...)
 	- airflow <itp> (bug #819700)
-CVE-2024-45034
+CVE-2024-45034 (Apache Airflow versions before 2.10.1 have a vulnerability that allows ...)
 	- airflow <itp> (bug #819700)
-CVE-2024-34158
+CVE-2024-34158 (Calling Parse on a "// +build" build tag line with deeply nested expre ...)
 	- golang-1.23 <unfixed>
 	- golang-1.22 <unfixed>
 	- golang-1.21 <unfixed>
@@ -122,7 +136,7 @@ CVE-2024-34158
 	NOTE: https://go.dev/issue/69141
 	NOTE: https://github.com/golang/go/commit/032ac075c20c01c6c35a672d1542d3e98eab84ea (go1.23.1)
 	NOTE: https://github.com/golang/go/commit/d4c53812e6ce2ac368173d7fcd31d0ecfcffb002 (go1.22.7)
-CVE-2024-34156
+CVE-2024-34156 (Calling Decoder.Decode on a message which contains deeply nested struc ...)
 	- golang-1.23 <unfixed>
 	- golang-1.22 <unfixed>
 	- golang-1.21 <unfixed>
@@ -133,7 +147,7 @@ CVE-2024-34156
 	NOTE: https://go.dev/issue/69139
 	NOTE: https://github.com/golang/go/commit/fa8ff1a46deb6c816304441ec6740ec112e19012 (go1.23.1)
 	NOTE: https://github.com/golang/go/commit/2092294f2b097c5828f4eace6c98a322c1510b01 (go1.22.7)
-CVE-2024-34155
+CVE-2024-34155 (Calling any of the Parse functions on Go source code which contains de ...)
 	- golang-1.23 <unfixed>
 	- golang-1.22 <unfixed>
 	- golang-1.21 <unfixed>



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/df75550d9cd46dced8112ea4793a2e6396e1fafb

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/df75550d9cd46dced8112ea4793a2e6396e1fafb
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240907/cfc7a160/attachment.htm>


More information about the debian-security-tracker-commits mailing list