[Git][security-tracker-team/security-tracker][master] add oss-sec reference for recent tunneling issues
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Jan 21 21:54:08 GMT 2025
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a4af1a42 by Moritz Muehlenhoff at 2025-01-21T22:53:17+01:00
add oss-sec reference for recent tunneling issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -841,6 +841,7 @@ CVE-2024-7596 [networkmanager: UDP encapsulation protocol excessive trust]
NOTE: https://github.com/vanhoefm/tunneltester
NOTE: https://www.top10vpn.com/research/tunneling-protocol-vulnerability/
NOTE: https://kb.cert.org/vuls/id/199397
+ NOTE: https://www.openwall.com/lists/oss-security/2025/01/21/10
CVE-2024-7595 [networkmanager: GRE & GRE6 protocol excessive trust]
NOT-FOR-US: IP tunnel protocol issue
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2317262
@@ -848,6 +849,7 @@ CVE-2024-7595 [networkmanager: GRE & GRE6 protocol excessive trust]
NOTE: https://github.com/vanhoefm/tunneltester
NOTE: https://www.top10vpn.com/research/tunneling-protocol-vulnerability/
NOTE: https://kb.cert.org/vuls/id/199397
+ NOTE: https://www.openwall.com/lists/oss-security/2025/01/21/10
CVE-2024-9042
- kubernetes <not-affected> (Windows-specific)
CVE-2025-23965 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
@@ -2115,12 +2117,14 @@ CVE-2025-23019 (IPv6-in-IPv4 tunneling (RFC 4213) allows an attacker to spoof an
NOTE: https://github.com/vanhoefm/tunneltester
NOTE: https://www.top10vpn.com/research/tunneling-protocol-vulnerability/
NOTE: https://kb.cert.org/vuls/id/199397
+ NOTE: https://www.openwall.com/lists/oss-security/2025/01/21/10
CVE-2025-23018 (IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the ...)
NOT-FOR-US: IP tunnel protocol issue
NOTE: https://papers.mathyvanhoef.com/usenix2025-tunnels.pdf
NOTE: https://github.com/vanhoefm/tunneltester
NOTE: https://www.top10vpn.com/research/tunneling-protocol-vulnerability/
NOTE: https://kb.cert.org/vuls/id/199397
+ NOTE: https://www.openwall.com/lists/oss-security/2025/01/21/10
CVE-2025-22984 (An access control issue in the component /api/squareComment/DelectSqua ...)
NOT-FOR-US: iceCMS
CVE-2025-22983 (An access control issue in the component /square/getAllSquare/circle o ...)
@@ -380577,6 +380581,7 @@ CVE-2020-10137 (Z-Wave devices based on Silicon Labs 700 series chipsets using S
CVE-2020-10136 (IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2 ...)
NOT-FOR-US: IP tunneling protocol issue
NOTE: https://github.com/vanhoefm/tunneltester
+ NOTE: https://www.openwall.com/lists/oss-security/2025/01/21/10
CVE-2020-10135 (Legacy pairing and secure-connections pairing authentication in Blueto ...)
NOTE: Bluetooth protocol issue
CVE-2020-10134 (Pairing in Bluetooth\xae Core v5.2 and earlier may permit an unauthent ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4af1a4280d564186fadcf9f572240ce929ac8fc
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4af1a4280d564186fadcf9f572240ce929ac8fc
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250121/7afe5cb3/attachment.htm>
More information about the debian-security-tracker-commits
mailing list