Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
c5fb4032 by Moritz Muehlenhoff at 2026-03-06T09:34:14+01:00
auto-nfu: Add rule for OpenClaw
- - - - -
2 changed files:
- data/CVE/list
- data/packages/nfu.yaml
Changes:
=====================================
data/CVE/list
=====================================
@@ -21,17 +21,17 @@ CVE-2026-2331 (An attacker may perform unauthenticated read
and write operations
CVE-2026-2330 (An attacker may access restricted filesystem areas on the
device via t ...)
NOT-FOR-US: SICK AG
CVE-2026-29613 (OpenClaw versions prior to 2026.2.12 contain a vulnerability
in the Bl ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29612 (OpenClaw versions prior to 2026.2.14 decode base64-backed
media inputs ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29611 (OpenClaw versions prior to 2026.2.14 contain a local file
inclusion vu ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29610 (OpenClaw versions prior to 2026.2.14 contain a command
hijacking vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29609 (OpenClaw versions prior to 2026.2.14 contain a denial of
service vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29606 (OpenClaw versions prior to 2026.2.14 contain a webhook
signature-verif ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29188 (File Browser provides a file managing interface within a
specified dir ...)
TODO: check
CVE-2026-29183 (SiYuan is a personal knowledge management system. Prior to
version 3.5 ...)
@@ -165,77 +165,77 @@ CVE-2026-28497 (TinyWeb is a web server (HTTP, HTTPS)
written in Delphi for Win3
CVE-2026-28492 (File Browser provides a file managing interface within a
specified dir ...)
TODO: check
CVE-2026-28486 (OpenClaw versions 2026.1.16-2 prior to 2026.2.14 contain a
path traver ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28485 (OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce
mandator ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28484 (OpenClaw versions prior to 2026.2.15 contain an option
injection vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28482 (OpenClaw versions prior to 2026.2.12 construct transcript file
paths u ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28481 (OpenClaw versions 2026.1.30 and earlier, contain an
information disclo ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28480 (OpenClaw versions prior to 2026.2.14 contain an authorization
bypass v ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28479 (OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox
identif ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28478 (OpenClaw versions prior to 2026.2.13 contain a denial of
service vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28477 (OpenClaw versions prior to 2026.2.14 contain an oauth state
validation ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28476 (OpenClaw versions prior to 2026.2.14 contain a server-side
request for ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28475 (OpenClaw versions prior to 2026.2.13 use non-constant-time
string comp ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28474 (OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6
accept equ ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28473 (OpenClaw versions prior to 2026.2.2 contain an authorization
bypass vu ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28472 (OpenClaw versions prior to 2026.2.2 contain a vulnerability in
the gat ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28471 (OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the
Matrix plugin ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28470 (OpenClaw versions prior to 2026.2.2 contain an exec approvals
(must be ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28469 (OpenClaw versions prior to 2026.2.14 contain a webhook routing
vulnera ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28468 (OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain
a vulner ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28467 (OpenClaw versions prior to 2026.2.2 contain a server-side
request forg ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28466 (OpenClaw versions prior to 2026.2.14 contain a vulnerability
in the ga ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28465 (OpenClaw's voice-call plugin versions before 2026.2.3 contain
an impro ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28464 (OpenClaw versions prior to 2026.2.12 use non-constant-time
string comp ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28463 (OpenClaw exec-approvals allowlist validation checks
pre-expansion argv ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28462 (OpenClaw versions prior to 2026.2.13 contain a vulnerability
in the br ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28459 (OpenClaw versions prior to 2026.2.12 fail to validate the
sessionFile ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28458 (OpenClaw version 2026.1.20 prior to 2026.2.1 contains a
vulnerability ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28457 (OpenClaw versions prior to 2026.2.14 contain a path traversal
vulnerab ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28456 (OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a
vulnerability ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28454 (OpenClaw versions prior to 2026.2.2 fail to validate webhook
secrets i ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28453 (OpenClaw versions prior to 2026.2.14 fail to validate TAR
archive entr ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28452 (OpenClaw versions prior to 2026.2.14 contain a denial of
service vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28451 (OpenClaw versions prior to 2026.2.14 contain server-side
request forge ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28450 (OpenClaw versions prior to 2026.2.12 with the optional Nostr
plugin en ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28448 (OpenClaw versions 2026.1.29 prior to 2026.2.1 contain a
vulnerability ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28447 (OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a
path tr ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28446 (OpenClaw versions prior to 2026.2.1 with the voice-call
extension inst ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28443 (OpenReplay is a self-hosted session replay suite. Prior to
version 1.2 ...)
TODO: check
CVE-2026-28442 (ZimaOS is a fork of CasaOS, an operating system for Zima
devices and x ...)
@@ -255,15 +255,15 @@ CVE-2026-28410 (The Graph is an indexing protocol for
querying networks like Eth
CVE-2026-28405 (MarkUs is a web application for the submission and grading of
student ...)
TODO: check
CVE-2026-28395 (OpenClaw version 2026.1.14-1 prior to 2026.2.12 contain an
improper ne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28394 (OpenClaw versions prior to 2026.2.15 contain a denial of
service vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28393 (OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a
path traver ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28392 (OpenClaw versions prior to 2026.2.14 contain a privilege
escalation vu ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28391 (OpenClaw versions prior to 2026.2.2 fail to properly validate
Windows ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-27807 (MarkUs is a web application for the submission and grading of
student ...)
TODO: check
CVE-2026-27778 (The WebSocket Application Programming Interface lacks
restrictions on ...)
=====================================
data/packages/nfu.yaml
=====================================
@@ -757,6 +757,8 @@
description: '.*\b(?i:Linksys)\b.*'
- reason: MyBB
description: '.*\bMyBB\b.*'
+- reason: OpenClaw
+ description: '.*\bOpenClaw\b.*'
- reason: OpenEMR
description: '.*\bOpenEMR\b.*'
- reason: PCMan FTP Server
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5fb40324ee6f0b693d06d29ab8d47b820ea74c0
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5fb40324ee6f0b693d06d29ab8d47b820ea74c0
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits