Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 6fa9a4f6 by security tracker role at 2024-05-14T08:11:51+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,4 +1,122 @@ -CVE-2024-4761 +CVE-2024-4855 (Use after free issue in editcap could cause denial of service via craf ...) + TODO: check +CVE-2024-4854 (MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4. ...) + TODO: check +CVE-2024-4853 (Memory handling issue in editcap could cause denial of service via cra ...) + TODO: check +CVE-2024-4840 (An flaw was found in the OpenStack Platform (RHOSP) director, a toolse ...) + TODO: check +CVE-2024-4810 (In register_device, the return value of ida_simple_get is unchecked, i ...) + TODO: check +CVE-2024-4712 (An arbitrary file creation vulnerability exists in PaperCut NG/MF that ...) + TODO: check +CVE-2024-4445 (The WP Compress \u2013 Image Optimizer [All-In-One] plugin for WordPre ...) + TODO: check +CVE-2024-4144 (The Simple Basic Contact Form plugin for WordPress for WordPress is vu ...) + TODO: check +CVE-2024-4139 (Manage Bank Statement ReProcessing Rules does not perform necessary au ...) + TODO: check +CVE-2024-4138 (Manage Bank Statement ReProcessing Rules does not perform necessary au ...) + TODO: check +CVE-2024-3241 (The Ultimate Blocks WordPress plugin before 3.1.7 does not validate a ...) + TODO: check +CVE-2024-3037 (An arbitrary file deletion vulnerability exists in PaperCut NG/MF that ...) + TODO: check +CVE-2024-34687 (SAP NetWeaver Application Server for ABAP and ABAP Platform do not suf ...) + TODO: check +CVE-2024-33878 + REJECTED +CVE-2024-33009 (SAP Global Label Management is vulnerable to SQL injection. On exploit ...) + TODO: check +CVE-2024-33008 (SAP Replication Server allows an attacker to use gateway for executing ...) + TODO: check +CVE-2024-33007 (PDFViewer is a control delivered as part of SAPUI5 product which shows ...) + TODO: check +CVE-2024-33006 (An unauthenticated attacker can upload a malicious file to the server ...) + TODO: check +CVE-2024-33004 (SAP Business Objects Business Intelligence Platform is vulnerable to I ...) + TODO: check +CVE-2024-33002 (Document Service handler (obsolete) in Data Provisioning Service does ...) + TODO: check +CVE-2024-33000 (SAP Bank Account Management does not perform necessary authorization c ...) + TODO: check +CVE-2024-32733 (Due to missing input validation and output encoding of untrusted data, ...) + TODO: check +CVE-2024-32731 (SAP My Travel Requests does not perform necessary authorization checks ...) + TODO: check +CVE-2024-28165 (SAP Business Objects Business Intelligence Platform is vulnerable to s ...) + TODO: check +CVE-2024-27852 (A privacy issue was addressed with improved client ID handling for alt ...) + TODO: check +CVE-2024-27847 (This issue was addressed with improved checks This issue is fixed in i ...) + TODO: check +CVE-2024-27843 (A logic issue was addressed with improved checks. This issue is fixed ...) + TODO: check +CVE-2024-27842 (The issue was addressed with improved checks. This issue is fixed in m ...) + TODO: check +CVE-2024-27841 (The issue was addressed with improved memory handling. This issue is f ...) + TODO: check +CVE-2024-27839 (A privacy issue was addressed by moving sensitive data to a more secur ...) + TODO: check +CVE-2024-27837 (A downgrade issue was addressed with additional code-signing restricti ...) + TODO: check +CVE-2024-27835 (This issue was addressed through improved state management. This issue ...) + TODO: check +CVE-2024-27834 (The issue was addressed with improved checks. This issue is fixed in i ...) + TODO: check +CVE-2024-27829 (The issue was addressed with improved memory handling. This issue is f ...) + TODO: check +CVE-2024-27827 (This issue was addressed through improved state management. This issue ...) + TODO: check +CVE-2024-27825 (A downgrade issue affecting Intel-based Mac computers was addressed wi ...) + TODO: check +CVE-2024-27824 (This issue was addressed by removing the vulnerable code. This issue i ...) + TODO: check +CVE-2024-27822 (A logic issue was addressed with improved restrictions. This issue is ...) + TODO: check +CVE-2024-27821 (A path handling issue was addressed with improved validation. This iss ...) + TODO: check +CVE-2024-27818 (The issue was addressed with improved memory handling. This issue is f ...) + TODO: check +CVE-2024-27816 (A logic issue was addressed with improved checks. This issue is fixed ...) + TODO: check +CVE-2024-27813 (The issue was addressed with improved checks. This issue is fixed in m ...) + TODO: check +CVE-2024-27810 (A path handling issue was addressed with improved validation. This iss ...) + TODO: check +CVE-2024-27804 (The issue was addressed with improved memory handling. This issue is f ...) + TODO: check +CVE-2024-27803 (A permissions issue was addressed with improved validation. This issue ...) + TODO: check +CVE-2024-27798 (An authorization issue was addressed with improved state management. T ...) + TODO: check +CVE-2024-27796 (The issue was addressed with improved checks. This issue is fixed in i ...) + TODO: check +CVE-2024-27789 (A logic issue was addressed with improved checks. This issue is fixed ...) + TODO: check +CVE-2024-25970 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.1 contains an impro ...) + TODO: check +CVE-2024-25969 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.1 contains an alloc ...) + TODO: check +CVE-2024-25968 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains a use of ...) + TODO: check +CVE-2024-25967 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.1 contains an execu ...) + TODO: check +CVE-2024-25966 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains an impro ...) + TODO: check +CVE-2024-25965 (Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains an exter ...) + TODO: check +CVE-2024-23576 (Security vulnerability in HCL Commerce 9.1.12 and 9.1.13 could allow d ...) + TODO: check +CVE-2024-23236 (A correctness issue was addressed with improved checks. This issue is ...) + TODO: check +CVE-2024-23229 (This issue was addressed with improved redaction of sensitive informat ...) + TODO: check +CVE-2024-0870 (The YITH WooCommerce Gift Cards plugin for WordPress is vulnerable to ...) + TODO: check +CVE-2023-6812 (The WP Compress \u2013 Image Optimizer [All-In-One plugin for WordPres ...) + TODO: check +CVE-2024-4761 (Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 all ...) - chromium <unfixed> [bullseye] - chromium <end-of-life> (see #1061268) [buster] - chromium <end-of-life> (see DSA 5046) @@ -1635,7 +1753,7 @@ CVE-2024-4558 (Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 [bullseye] - chromium <end-of-life> (see #1061268) [buster] - chromium <end-of-life> (see DSA 5046) CVE-2024-34397 (An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2. ...) - {DSA-5682-1} + {DSA-5682-1 DLA-3814-1} - glib2.0 2.80.0-10 NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/3268 NOTE: Fixes: https://gitlab.gnome.org/GNOME/glib/-/issues/3268#fixes @@ -31068,12 +31186,14 @@ CVE-2023-52355 (An out-of-memory flaw was found in libtiff that could be trigger NOTE: https://gitlab.com/libtiff/libtiff/-/commit/16ab4a205cfc938c32686e8d697d048fabf97ed4 NOTE: Issue fixed by providing a documentation update CVE-2023-40551 (A flaw was found in the MZ binary format in Shim. An out-of-bounds rea ...) + {DLA-3813-1} - shim 15.8-1 (bug #1061519) [bookworm] - shim <no-dsa> (Minor issue, fix with a point release) [bullseye] - shim <no-dsa> (Minor issue, fix with a point release) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2259918 NOTE: https://github.com/rhboot/shim/commit/5a5147d1e19cf90ec280990c84061ac3f67ea1ab (15.8) CVE-2023-40550 (An out-of-bounds read flaw was found in Shim when it tried to validate ...) + {DLA-3813-1} - shim 15.8-1 (bug #1061519) [bookworm] - shim <no-dsa> (Minor issue, fix with a point release) [bullseye] - shim <no-dsa> (Minor issue, fix with a point release) @@ -31081,24 +31201,28 @@ CVE-2023-40550 (An out-of-bounds read flaw was found in Shim when it tried to va NOTE: https://github.com/rhboot/shim/commit/93ce2552f3e9f71f888a672913bfc0eef255c56d (15.8) NOTE: Followup: https://github.com/rhboot/shim/commit/e7f5fdf53ee68025f3ef2688e2f27ccb0082db83 (15.8) CVE-2023-40549 (An out-of-bounds read flaw was found in Shim due to the lack of proper ...) + {DLA-3813-1} - shim 15.8-1 (bug #1061519) [bookworm] - shim <no-dsa> (Minor issue, fix with a point release) [bullseye] - shim <no-dsa> (Minor issue, fix with a point release) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2241797 NOTE: https://github.com/rhboot/shim/commit/afdc5039de0a4a3a40162a32daa070f94a883f09 (15.8) CVE-2023-40548 (A buffer overflow was found in Shim in the 32-bit system. The overflow ...) + {DLA-3813-1} - shim 15.8-1 (bug #1061519) [bookworm] - shim <no-dsa> (Minor issue, fix with a point release) [bullseye] - shim <no-dsa> (Minor issue, fix with a point release) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2241782 NOTE: https://github.com/rhboot/shim/commit/96dccc255b16e9465dbee50b3cef6b3db74d11c8 (15.8) CVE-2023-40547 (A remote code execution vulnerability was found in Shim. The Shim boot ...) + {DLA-3813-1} - shim 15.8-1 (bug #1061519) [bookworm] - shim <no-dsa> (Minor issue, fix with a point release) [bullseye] - shim <no-dsa> (Minor issue, fix with a point release) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2234589 NOTE: https://github.com/rhboot/shim/commit/0226b56513b2b8bd5fd281bce77c40c9bf07c66d (15.8) CVE-2023-40546 (A flaw was found in Shim when an error happened while creating a new E ...) + {DLA-3813-1} - shim 15.8-1 (bug #1061519) [bookworm] - shim <no-dsa> (Minor issue, fix with a point release) [bullseye] - shim <no-dsa> (Minor issue, fix with a point release) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6fa9a4f6e32d0fb1d7420fbb876c4cc69db71b0c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6fa9a4f6e32d0fb1d7420fbb876c4cc69db71b0c You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits