Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a1ea755c by Moritz Muehlenhoff at 2023-10-22T22:31:01+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,11 +1,11 @@
 CVE-2023-46306 (The web administration interface in NetModule Router Software 
(NRSW) 4 ...)
-       TODO: check
+       NOT-FOR-US: NetModule Router Software
 CVE-2023-46303 (link_to_local_path in ebooks/conversion/plugins/html_input.py 
in calib ...)
        TODO: check
 CVE-2021-46898 (views/switch.py in django-grappelli (aka Django Grappelli) 
before 2.15 ...)
-       TODO: check
+       NOT-FOR-US: Django Grappelli
 CVE-2021-46897 (views.py in Wagtail CRX CodeRed Extensions (formerly CodeRed 
CMS or co ...)
-       TODO: check
+       NOT-FOR-US: Wagtail CRX CodeRed Extensions
 CVE-2023-XXXX [SQUID-2023:5 Denial of Service in FTP]
        - squid <unfixed>
        [bullseye] - squid <not-affected> (Vulnerable code not present)
@@ -71,7 +71,7 @@ CVE-2023-46301 (iTerm2 before 3.4.20 allow (potentially 
remote) code execution b
 CVE-2023-46300 (iTerm2 before 3.4.20 allow (potentially remote) code execution 
because ...)
        NOT-FOR-US: iTerm2
 CVE-2023-46298 (Next.js before 13.4.20-canary.13 lacks a cache-control header 
and thus ...)
-       TODO: check
+       NOT-FOR-US: Next.js
 CVE-2023-46078 (Cross-Site Request Forgery (CSRF) vulnerability in PluginEver 
WC Seria ...)
        NOT-FOR-US: WordPress plugin
 CVE-2023-46067 (Cross-Site Request Forgery (CSRF) vulnerability in Qwerty23 
Rocket Fon ...)
@@ -580,7 +580,7 @@ CVE-2023-45814 (Bunkum is an open-source protocol-agnostic 
request server for cu
 CVE-2023-45813 (Torbot is an open source tor network intelligence tool. In 
affected ve ...)
        NOT-FOR-US: Torbot
 CVE-2023-45812 (The Apollo Router is a configurable, high-performance graph 
router wri ...)
-       TODO: check
+       NOT-FOR-US: Apollo Router
 CVE-2023-45146 (XXL-RPC is a high performance, distributed RPC framework. With 
it, a T ...)
        NOT-FOR-US: XXL-RPC
 CVE-2023-45145 (Redis is an in-memory database that persists on disk. On 
startup, Redi ...)
@@ -622,7 +622,7 @@ CVE-2023-5631 (Roundcube before 1.4.15, 1.5.x before 1.5.5, 
and 1.6.x before 1.6
        - roundcube 1.6.4+dfsg-1 (bug #1054079)
        NOTE: 
https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d
 (1.6.4)
 CVE-2023-4601 (A stack-based buffer overflow vulnerability exists in NI System 
Config ...)
-       TODO: check
+       NOT-FOR-US: NI System Configuration
 CVE-2023-46009 (gifsicle-1.94 was found to have a floating point exception 
(FPE) vulne ...)
        - gifsicle <unfixed> (unimportant)
        NOTE: https://github.com/kohler/gifsicle/issues/196
@@ -769,7 +769,7 @@ CVE-2023-38552 (When the Node.js policy feature checks the 
integrity of a resour
        NOTE: 
https://nodejs.org/en/blog/vulnerability/october-2023-security-releases#integrity-checks-according-to-policies-can-be-circumvented-medium---cve-2023-38552
        NOTE: 
https://github.com/nodejs/node/commit/1c538938ccadfd35fbc699d8e85102736cd5945c
 CVE-2023-36321 (Connected Vehicle Systems Alliance (COVESA) up to v2.18.8 was 
discover ...)
-       TODO: check
+       NOT-FOR-US: COVESA
 CVE-2023-35084 (Unsafe Deserialization of User Input could lead to Execution 
of Unauth ...)
        NOT-FOR-US: Ivanti
 CVE-2023-35083 (Allows an authenticated attacker with network access to read 
arbitrary ...)
@@ -65882,7 +65882,7 @@ CVE-2023-20600
 CVE-2023-20599
        RESERVED
 CVE-2023-20598 (An improper privilege management in the AMD 
Radeon\u2122Graphics drive ...)
-       TODO: check
+       NOT-FOR-US: AMD
 CVE-2023-20597 (Improper initialization of variables in the DXE driver may 
allow a pri ...)
        NOT-FOR-US: AMD
 CVE-2023-20596



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a1ea755ce2ff09ce431e9466d9d67d2ca27bc207

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a1ea755ce2ff09ce431e9466d9d67d2ca27bc207
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to