[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Sep 24 20:54:24 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
03b55615 by Salvatore Bonaccorso at 2024-09-24T21:54:03+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -81,7 +81,7 @@ CVE-2024-7018 (Heap buffer overflow in PDF in Google Chrome prior to 124.0.6367.
 	- chromium 124.0.6367.78-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2024-46957 (Mellium mellium.im/xmpp 0.0.1 through 0.21.4 allows response spoofing  ...)
-	TODO: check
+	NOT-FOR-US: Mellium mellium.im/xmpp
 CVE-2024-39928 (In Apache Linkis <= 1.5.0, a Random string security vulnerability in S ...)
 	NOT-FOR-US: Apache Linkis
 CVE-2024-38269 (An improper restriction of operations within the bounds of a memory bu ...)
@@ -168,15 +168,15 @@ CVE-2024-23933 (Sony XAV-AX5500 CarPlay TLV Stack-based Buffer Overflow Remote C
 CVE-2024-23922 (Sony XAV-AX5500 Insufficient Firmware Update Validation Remote Code Ex ...)
 	NOT-FOR-US: Sony XAV-AX5500
 CVE-2024-0005 (A condition exists in FlashArray and FlashBlade Purity whereby a malic ...)
-	TODO: check
+	NOT-FOR-US: FlashArray and FlashBlade Purity
 CVE-2024-0004 (A condition exists in FlashArray Purity whereby an user with array adm ...)
-	TODO: check
+	NOT-FOR-US: FlashArray Purity
 CVE-2024-0003 (A condition exists in FlashArray Purity whereby a malicious user could ...)
-	TODO: check
+	NOT-FOR-US: FlashArray Purity
 CVE-2024-0002 (A condition exists in FlashArray Purity whereby an attacker can employ ...)
-	TODO: check
+	NOT-FOR-US: FlashArray Purity
 CVE-2024-0001 (A condition exists in FlashArray Purity whereby a local account intend ...)
-	TODO: check
+	NOT-FOR-US: FlashArray Purity
 CVE-2023-46948 (A reflected Cross-Site Scripting (XSS) vulnerability was found on Teme ...)
 	NOT-FOR-US: Temenos T24 Browser
 CVE-2022-48945 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
@@ -175082,7 +175082,7 @@ CVE-2022-2441 (The ImageMagick Engine plugin for WordPress is vulnerable to remo
 CVE-2022-2440 (The Theme Editor plugin for WordPress is vulnerable to deserialization ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2022-2439 (The Easy Digital Downloads \u2013 Simple eCommerce for Selling Digital ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2022-2438 (The Broken Link Checker plugin for WordPress is vulnerable to deserial ...)
 	NOT-FOR-US: Broken Link Checker plugin for WordPress
 CVE-2022-2437 (The Feed Them Social \u2013 for Twitter feed, Youtube and more plugin  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/03b55615057e5c3d67042a927507d61035a4ca6e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/03b55615057e5c3d67042a927507d61035a4ca6e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240924/bb8483ba/attachment.htm>


More information about the debian-security-tracker-commits mailing list