[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Jan 6 20:12:05 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
3d567e01 by security tracker role at 2025-01-06T20:11:56+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,56 +1,166 @@
-CVE-2024-56769 [media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg]
+CVE-2025-21618 (NiceGUI is an easy-to-use, Python-based UI framework. Prior to 2.9.1,  ...)
+	TODO: check
+CVE-2025-21617 (Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior t ...)
+	TODO: check
+CVE-2025-21615 (AAT (Another Activity Tracker) is a GPS-tracking application for track ...)
+	TODO: check
+CVE-2025-21614 (go-git is a highly extensible git implementation library written in pu ...)
+	TODO: check
+CVE-2025-21613 (go-git is a highly extensible git implementation library written in pu ...)
+	TODO: check
+CVE-2025-21612 (TabberNeue is a MediaWiki extension that allows the wiki to create tab ...)
+	TODO: check
+CVE-2025-21611 (tgstation-server is a production scale tool for BYOND server managemen ...)
+	TODO: check
+CVE-2025-21604 (LangChain4j-AIDeepin is a Retrieval enhancement generation (RAG) proje ...)
+	TODO: check
+CVE-2024-8474 (OpenVPN Connect before version 3.5.0 can contain the configuration pro ...)
+	TODO: check
+CVE-2024-56828 (File Upload vulnerability in ChestnutCMS through 1.5.0. Based on the c ...)
+	TODO: check
+CVE-2024-55629 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	TODO: check
+CVE-2024-55628 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	TODO: check
+CVE-2024-55627 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	TODO: check
+CVE-2024-55626 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	TODO: check
+CVE-2024-55605 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	TODO: check
+CVE-2024-55529 (Z-BlogPHP 1.7.3 is vulnerable to arbitrary code execution via \zb_user ...)
+	TODO: check
+CVE-2024-55408 (An issue in the AsusSAIO.sys component of ASUS System Analysis IO v1.0 ...)
+	TODO: check
+CVE-2024-55407 (An issue in the DeviceloControl function of ITE Tech. Inc ITE IO Acces ...)
+	TODO: check
+CVE-2024-54880 (SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw c ...)
+	TODO: check
+CVE-2024-54879 (SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw c ...)
+	TODO: check
+CVE-2024-51472 (IBM UrbanCode Deploy (UCD) 7.2 through 7.2.3.13, 7.3 through 7.3.2.8,  ...)
+	TODO: check
+CVE-2024-51112 (Open Redirect vulnerability in Pnetlab 5.3.11 allows an attacker to ma ...)
+	TODO: check
+CVE-2024-51111 (Cross-Site Scripting (XSS) vulnerability in Pnetlab 5.3.11 allows an a ...)
+	TODO: check
+CVE-2024-47475 (Dell PowerScale OneFS 8.2.2.x through 9.8.0.x contains an incorrect pe ...)
+	TODO: check
+CVE-2024-46622 (An Escalation of Privilege security vulnerability was found in SecureA ...)
+	TODO: check
+CVE-2024-46209 (A stored cross-site scripting (XSS) vulnerability in the component /me ...)
+	TODO: check
+CVE-2024-46073 (A reflected Cross-Site Scripting (XSS) vulnerability exists in the log ...)
+	TODO: check
+CVE-2024-45559 (Transient DOS can occur when GVM sends a specific message type to the  ...)
+	TODO: check
+CVE-2024-45558 (Transient DOS can occur when the driver parses the per STA profile IE  ...)
+	TODO: check
+CVE-2024-45555 (Memory corruption can occur if an already verified IFS2 image is overw ...)
+	TODO: check
+CVE-2024-45553 (Memory corruption can occur when process-specific maps are added to th ...)
+	TODO: check
+CVE-2024-45550 (Memory corruption occurs when invoking any IOCTL-calling application t ...)
+	TODO: check
+CVE-2024-45548 (Memory corruption while processing FIPS encryption or decryption valid ...)
+	TODO: check
+CVE-2024-45547 (Memory corruption while processing IOCTL call invoked from user-space  ...)
+	TODO: check
+CVE-2024-45546 (Memory corruption while processing FIPS encryption or decryption IOCTL ...)
+	TODO: check
+CVE-2024-45542 (Memory corruption when IOCTL call is invoked from user-space to write  ...)
+	TODO: check
+CVE-2024-45541 (Memory corruption when IOCTL call is invoked from user-space to read b ...)
+	TODO: check
+CVE-2024-43064 (Uncontrolled resource consumption when a driver, an application or a S ...)
+	TODO: check
+CVE-2024-43063 (information disclosure while invoking the mailbox read API.)
+	TODO: check
+CVE-2024-35498 (A cross-site scripting (XSS) vulnerability in Grav v1.7.45 allows atta ...)
+	TODO: check
+CVE-2024-33067 (Information disclosure while invoking callback function of sound model ...)
+	TODO: check
+CVE-2024-33061 (Information disclosure while processing IOCTL call made for releasing  ...)
+	TODO: check
+CVE-2024-33059 (Memory corruption while processing frame command IOCTL calls.)
+	TODO: check
+CVE-2024-33055 (Memory corruption while invoking IOCTL calls to unmap the DMA buffers.)
+	TODO: check
+CVE-2024-33041 (Memory corruption when input parameter validation for number of fences ...)
+	TODO: check
+CVE-2024-31914 (IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 a ...)
+	TODO: check
+CVE-2024-31913 (IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 a ...)
+	TODO: check
+CVE-2024-23366 (Information Disclosure while invoking the mailbox write API when messa ...)
+	TODO: check
+CVE-2024-21464 (Memory corruption while processing IPA statistics, when there are no a ...)
+	TODO: check
+CVE-2024-12997
+	REJECTED
+CVE-2024-12996
+	REJECTED
+CVE-2024-12970 (Improper Neutralization of Special Elements used in an OS Command ('OS ...)
+	TODO: check
+CVE-2023-6605 (A flaw was found in FFmpeg's DASH playlist support. This vulnerability ...)
+	TODO: check
+CVE-2023-6604 (A flaw was found in FFmpeg. This vulnerability allows unexpected addit ...)
+	TODO: check
+CVE-2023-6601 (A flaw was found in FFmpeg's HLS demuxer. This vulnerability allows by ...)
+	TODO: check
+CVE-2024-56769 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.8-1
 	[bookworm] - linux 6.1.123-1
 	NOTE: https://git.kernel.org/linus/2dd59fe0e19e1ab955259978082b62e5751924c7 (6.13-rc4)
-CVE-2024-56768 [bpf: Fix bpf_get_smp_processor_id() on !CONFIG_SMP]
+CVE-2024-56768 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.12.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/23579010cf0a12476e96a5f1acdf78a9c5843657 (6.13-rc4)
-CVE-2024-56767 [dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset]
+CVE-2024-56767 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.8-1
 	[bookworm] - linux 6.1.123-1
 	NOTE: https://git.kernel.org/linus/c43ec96e8d34399bd9dab2f2dc316b904892133f (6.13-rc5)
-CVE-2024-56766 [mtd: rawnand: fix double free in atmel_pmecc_create_user()]
+CVE-2024-56766 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.8-1
 	[bookworm] - linux 6.1.123-1
 	NOTE: https://git.kernel.org/linus/d8e4771f99c0400a1873235704b28bb803c83d17 (6.13-rc5)
-CVE-2024-56765 [powerpc/pseries/vas: Add close() callback in vas_vm_ops struct]
+CVE-2024-56765 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.12.8-1
 	[bookworm] - linux 6.1.123-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/05aa156e156ef3168e7ab8a68721945196495c17 (6.13-rc5)
-CVE-2024-56764 [ublk: detach gendisk from ublk device if add_disk() fails]
+CVE-2024-56764 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.12.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/75cd4005da5492129917a4a4ee45e81660556104 (6.13-rc5)
-CVE-2024-56763 [tracing: Prevent bad count for tracing_cpumask_write]
+CVE-2024-56763 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.12.8-1
 	[bookworm] - linux 6.1.123-1
 	NOTE: https://git.kernel.org/linus/98feccbf32cfdde8c722bc4587aaa60ee5ac33f0 (6.13-rc5)
-CVE-2024-56762 [io_uring/sqpoll: fix sqpoll error handling races]
+CVE-2024-56762 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.12.8-1
 	[bookworm] - linux 6.1.123-1
 	NOTE: https://git.kernel.org/linus/e33ac68e5e21ec1292490dfe061e75c0dbdd3bd4 (6.13-rc5)
-CVE-2024-56761 [x86/fred: Clear WFE in missing-ENDBRANCH #CPs]
+CVE-2024-56761 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.12.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/dc81e556f2a017d681251ace21bf06c126d5a192 (6.13-rc5)
-CVE-2024-56760 [PCI/MSI: Handle lack of irqdomain gracefully]
+CVE-2024-56760 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
 	- linux 6.12.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a60b990798eb17433d0283788280422b1bd94b18 (6.13-rc5)
-CVE-2024-56759 [btrfs: fix use-after-free when COWing tree bock and tracing is enabled]
+CVE-2024-56759 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.12.8-1
 	NOTE: https://git.kernel.org/linus/44f52bbe96dfdbe4aca3818a2534520082a07040 (6.13-rc5)
-CVE-2024-56758 [btrfs: check folio mapping after unlock in relocate_one_folio()]
+CVE-2024-56758 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.12.8-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3e74859ee35edc33a022c3f3971df066ea0ca6b9 (6.13-rc5)
-CVE-2024-56757 [Bluetooth: btusb: mediatek: add intf release flow when usb disconnect]
+CVE-2024-56757 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.12.8-1
 	NOTE: https://git.kernel.org/linus/489304e67087abddc2666c5af0159cb95afdcf59 (6.13-rc1)
 CVE-2025-0233 (A vulnerability was found in Codezips Project Management System 1.0. I ...)
@@ -49976,7 +50086,7 @@ CVE-2024-28882 (OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multi
 	[bullseye] - openvpn <not-affected> (Vulnerable code not present)
 	NOTE: Introduced by: https://github.com/OpenVPN/openvpn/commit/d468dff7bdfd79059818c190ddf41b125bb658de (v2.6_beta1)
 	NOTE: Fixed by: https://github.com/OpenVPN/openvpn/commit/65fb67cd6c320a426567b2922c4282fb8738ba3f (v2.6.11)
-CVE-2024-5594
+CVE-2024-5594 (OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly wh ...)
 	- openvpn 2.6.11-1 (bug #1074488)
 	[bookworm] - openvpn <no-dsa> (Minor issue)
 	[bullseye] - openvpn <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d567e015dffa50fe03bef831a245a7ed0b878dc

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d567e015dffa50fe03bef831a245a7ed0b878dc
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250106/c3739e93/attachment.htm>


More information about the debian-security-tracker-commits mailing list