Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0e638ef3 by Moritz Muehlenhoff at 2024-10-12T11:21:45+02:00
new h2o issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -174,11 +174,16 @@ CVE-2024-46215 (A vulnerability was discovered in 
KM08-708H-v1.1, There is a buf
 CVE-2024-46088 (An arbitrary file upload vulnerability in the 
ProductAction.entphone i ...)
        NOT-FOR-US: Zhejiang University Entersoft Customer Resource Management 
System
 CVE-2024-45403 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and 
HTTP/3. Wh ...)
-       TODO: check
+       - h2o <unfixed>
+       NOTE: https://github.com/h2o/h2o/security/advisories/GHSA-4xp5-3jhc-3m92
+       NOTE: 
https://github.com/h2o/h2o/commit/16b13eee8ad7895b4fe3fcbcabee53bd52782562
+       NOTE: 
https://github.com/h2o/h2o/commit/1ed32b23f999acf0c5029f09c8525f93eb1d354c
 CVE-2024-45402 (Picotls is a TLS protocol library that allows users select 
different c ...)
        - picotls <itp> (bug #925405)
 CVE-2024-45397 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and 
HTTP/3. Wh ...)
-       TODO: check
+       - h2o <unfixed>
+       NOTE: https://github.com/h2o/h2o/security/advisories/GHSA-jf2c-xjcp-wg4c
+       NOTE: 
https://github.com/h2o/h2o/commit/15ed15a2efb83a77bb4baaa5a119e639c2f6898a
 CVE-2024-45396 (Quicly is an IETF QUIC protocol implementation. Quicly up to 
commtit d ...)
        NOT-FOR-US: Quicly
 CVE-2024-45317 (A Server-Side Request Forgery (SSRF) vulnerability in SMA1000 
applianc ...)
@@ -222,7 +227,10 @@ CVE-2024-33579 (A DLL hijack vulnerability was reported in 
Lenovo Baiying that c
 CVE-2024-33578 (A DLL hijack vulnerability was reported in Lenovo Leyun that 
could all ...)
        NOT-FOR-US: Lenovo
 CVE-2024-25622 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and 
HTTP/3. Th ...)
-       TODO: check
+       - h2o <unfixed>
+       NOTE: https://github.com/h2o/h2o/security/advisories/GHSA-5m7v-cj65-h6pj
+       NOTE: https://github.com/h2o/h2o/issues/3332
+       NOTE: 
https://github.com/h2o/h2o/commit/123f5e2b65dcdba8f7ef659a00d24bd1249141be
 CVE-2023-42133 (PAX Android based POS devices allow for escalation of 
privilege via im ...)
        NOT-FOR-US: PAX Android based POS devices
 CVE-2024-9779



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e638ef3971a19c06c859cfbee20fda5305f8871

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e638ef3971a19c06c859cfbee20fda5305f8871
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to