Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3d567e01 by security tracker role at 2025-01-06T20:11:56+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,56 +1,166 @@
-CVE-2024-56769 [media: dvb-frontends: dib3000mb: fix uninit-value in 
dib3000_write_reg]
+CVE-2025-21618 (NiceGUI is an easy-to-use, Python-based UI framework. Prior to 
2.9.1,  ...)
+       TODO: check
+CVE-2025-21617 (Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. 
Prior t ...)
+       TODO: check
+CVE-2025-21615 (AAT (Another Activity Tracker) is a GPS-tracking application 
for track ...)
+       TODO: check
+CVE-2025-21614 (go-git is a highly extensible git implementation library 
written in pu ...)
+       TODO: check
+CVE-2025-21613 (go-git is a highly extensible git implementation library 
written in pu ...)
+       TODO: check
+CVE-2025-21612 (TabberNeue is a MediaWiki extension that allows the wiki to 
create tab ...)
+       TODO: check
+CVE-2025-21611 (tgstation-server is a production scale tool for BYOND server 
managemen ...)
+       TODO: check
+CVE-2025-21604 (LangChain4j-AIDeepin is a Retrieval enhancement generation 
(RAG) proje ...)
+       TODO: check
+CVE-2024-8474 (OpenVPN Connect before version 3.5.0 can contain the 
configuration pro ...)
+       TODO: check
+CVE-2024-56828 (File Upload vulnerability in ChestnutCMS through 1.5.0. Based 
on the c ...)
+       TODO: check
+CVE-2024-55629 (Suricata is a network Intrusion Detection System, Intrusion 
Prevention ...)
+       TODO: check
+CVE-2024-55628 (Suricata is a network Intrusion Detection System, Intrusion 
Prevention ...)
+       TODO: check
+CVE-2024-55627 (Suricata is a network Intrusion Detection System, Intrusion 
Prevention ...)
+       TODO: check
+CVE-2024-55626 (Suricata is a network Intrusion Detection System, Intrusion 
Prevention ...)
+       TODO: check
+CVE-2024-55605 (Suricata is a network Intrusion Detection System, Intrusion 
Prevention ...)
+       TODO: check
+CVE-2024-55529 (Z-BlogPHP 1.7.3 is vulnerable to arbitrary code execution via 
\zb_user ...)
+       TODO: check
+CVE-2024-55408 (An issue in the AsusSAIO.sys component of ASUS System Analysis 
IO v1.0 ...)
+       TODO: check
+CVE-2024-55407 (An issue in the DeviceloControl function of ITE Tech. Inc ITE 
IO Acces ...)
+       TODO: check
+CVE-2024-54880 (SeaCMS V13.1 is vulnerable to Incorrect Access Control. A 
logic flaw c ...)
+       TODO: check
+CVE-2024-54879 (SeaCMS V13.1 is vulnerable to Incorrect Access Control. A 
logic flaw c ...)
+       TODO: check
+CVE-2024-51472 (IBM UrbanCode Deploy (UCD) 7.2 through 7.2.3.13, 7.3 through 
7.3.2.8,  ...)
+       TODO: check
+CVE-2024-51112 (Open Redirect vulnerability in Pnetlab 5.3.11 allows an 
attacker to ma ...)
+       TODO: check
+CVE-2024-51111 (Cross-Site Scripting (XSS) vulnerability in Pnetlab 5.3.11 
allows an a ...)
+       TODO: check
+CVE-2024-47475 (Dell PowerScale OneFS 8.2.2.x through 9.8.0.x contains an 
incorrect pe ...)
+       TODO: check
+CVE-2024-46622 (An Escalation of Privilege security vulnerability was found in 
SecureA ...)
+       TODO: check
+CVE-2024-46209 (A stored cross-site scripting (XSS) vulnerability in the 
component /me ...)
+       TODO: check
+CVE-2024-46073 (A reflected Cross-Site Scripting (XSS) vulnerability exists in 
the log ...)
+       TODO: check
+CVE-2024-45559 (Transient DOS can occur when GVM sends a specific message type 
to the  ...)
+       TODO: check
+CVE-2024-45558 (Transient DOS can occur when the driver parses the per STA 
profile IE  ...)
+       TODO: check
+CVE-2024-45555 (Memory corruption can occur if an already verified IFS2 image 
is overw ...)
+       TODO: check
+CVE-2024-45553 (Memory corruption can occur when process-specific maps are 
added to th ...)
+       TODO: check
+CVE-2024-45550 (Memory corruption occurs when invoking any IOCTL-calling 
application t ...)
+       TODO: check
+CVE-2024-45548 (Memory corruption while processing FIPS encryption or 
decryption valid ...)
+       TODO: check
+CVE-2024-45547 (Memory corruption while processing IOCTL call invoked from 
user-space  ...)
+       TODO: check
+CVE-2024-45546 (Memory corruption while processing FIPS encryption or 
decryption IOCTL ...)
+       TODO: check
+CVE-2024-45542 (Memory corruption when IOCTL call is invoked from user-space 
to write  ...)
+       TODO: check
+CVE-2024-45541 (Memory corruption when IOCTL call is invoked from user-space 
to read b ...)
+       TODO: check
+CVE-2024-43064 (Uncontrolled resource consumption when a driver, an 
application or a S ...)
+       TODO: check
+CVE-2024-43063 (information disclosure while invoking the mailbox read API.)
+       TODO: check
+CVE-2024-35498 (A cross-site scripting (XSS) vulnerability in Grav v1.7.45 
allows atta ...)
+       TODO: check
+CVE-2024-33067 (Information disclosure while invoking callback function of 
sound model ...)
+       TODO: check
+CVE-2024-33061 (Information disclosure while processing IOCTL call made for 
releasing  ...)
+       TODO: check
+CVE-2024-33059 (Memory corruption while processing frame command IOCTL calls.)
+       TODO: check
+CVE-2024-33055 (Memory corruption while invoking IOCTL calls to unmap the DMA 
buffers.)
+       TODO: check
+CVE-2024-33041 (Memory corruption when input parameter validation for number 
of fences ...)
+       TODO: check
+CVE-2024-31914 (IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 
6.1.2.5 a ...)
+       TODO: check
+CVE-2024-31913 (IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 
6.1.2.5 a ...)
+       TODO: check
+CVE-2024-23366 (Information Disclosure while invoking the mailbox write API 
when messa ...)
+       TODO: check
+CVE-2024-21464 (Memory corruption while processing IPA statistics, when there 
are no a ...)
+       TODO: check
+CVE-2024-12997
+       REJECTED
+CVE-2024-12996
+       REJECTED
+CVE-2024-12970 (Improper Neutralization of Special Elements used in an OS 
Command ('OS ...)
+       TODO: check
+CVE-2023-6605 (A flaw was found in FFmpeg's DASH playlist support. This 
vulnerability ...)
+       TODO: check
+CVE-2023-6604 (A flaw was found in FFmpeg. This vulnerability allows 
unexpected addit ...)
+       TODO: check
+CVE-2023-6601 (A flaw was found in FFmpeg's HLS demuxer. This vulnerability 
allows by ...)
+       TODO: check
+CVE-2024-56769 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
        - linux 6.12.8-1
        [bookworm] - linux 6.1.123-1
        NOTE: 
https://git.kernel.org/linus/2dd59fe0e19e1ab955259978082b62e5751924c7 (6.13-rc4)
-CVE-2024-56768 [bpf: Fix bpf_get_smp_processor_id() on !CONFIG_SMP]
+CVE-2024-56768 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
        - linux 6.12.8-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/23579010cf0a12476e96a5f1acdf78a9c5843657 (6.13-rc4)
-CVE-2024-56767 [dmaengine: at_xdmac: avoid null_prt_deref in 
at_xdmac_prep_dma_memset]
+CVE-2024-56767 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux 6.12.8-1
        [bookworm] - linux 6.1.123-1
        NOTE: 
https://git.kernel.org/linus/c43ec96e8d34399bd9dab2f2dc316b904892133f (6.13-rc5)
-CVE-2024-56766 [mtd: rawnand: fix double free in atmel_pmecc_create_user()]
+CVE-2024-56766 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
        - linux 6.12.8-1
        [bookworm] - linux 6.1.123-1
        NOTE: 
https://git.kernel.org/linus/d8e4771f99c0400a1873235704b28bb803c83d17 (6.13-rc5)
-CVE-2024-56765 [powerpc/pseries/vas: Add close() callback in vas_vm_ops struct]
+CVE-2024-56765 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.12.8-1
        [bookworm] - linux 6.1.123-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/05aa156e156ef3168e7ab8a68721945196495c17 (6.13-rc5)
-CVE-2024-56764 [ublk: detach gendisk from ublk device if add_disk() fails]
+CVE-2024-56764 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
        - linux 6.12.8-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/75cd4005da5492129917a4a4ee45e81660556104 (6.13-rc5)
-CVE-2024-56763 [tracing: Prevent bad count for tracing_cpumask_write]
+CVE-2024-56763 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
        - linux 6.12.8-1
        [bookworm] - linux 6.1.123-1
        NOTE: 
https://git.kernel.org/linus/98feccbf32cfdde8c722bc4587aaa60ee5ac33f0 (6.13-rc5)
-CVE-2024-56762 [io_uring/sqpoll: fix sqpoll error handling races]
+CVE-2024-56762 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux 6.12.8-1
        [bookworm] - linux 6.1.123-1
        NOTE: 
https://git.kernel.org/linus/e33ac68e5e21ec1292490dfe061e75c0dbdd3bd4 (6.13-rc5)
-CVE-2024-56761 [x86/fred: Clear WFE in missing-ENDBRANCH #CPs]
+CVE-2024-56761 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
        - linux 6.12.8-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/dc81e556f2a017d681251ace21bf06c126d5a192 (6.13-rc5)
-CVE-2024-56760 [PCI/MSI: Handle lack of irqdomain gracefully]
+CVE-2024-56760 (In the Linux kernel, the following vulnerability has been 
resolved:  P ...)
        - linux 6.12.8-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/a60b990798eb17433d0283788280422b1bd94b18 (6.13-rc5)
-CVE-2024-56759 [btrfs: fix use-after-free when COWing tree bock and tracing is 
enabled]
+CVE-2024-56759 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
        - linux 6.12.8-1
        NOTE: 
https://git.kernel.org/linus/44f52bbe96dfdbe4aca3818a2534520082a07040 (6.13-rc5)
-CVE-2024-56758 [btrfs: check folio mapping after unlock in 
relocate_one_folio()]
+CVE-2024-56758 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
        - linux 6.12.8-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/3e74859ee35edc33a022c3f3971df066ea0ca6b9 (6.13-rc5)
-CVE-2024-56757 [Bluetooth: btusb: mediatek: add intf release flow when usb 
disconnect]
+CVE-2024-56757 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
        - linux 6.12.8-1
        NOTE: 
https://git.kernel.org/linus/489304e67087abddc2666c5af0159cb95afdcf59 (6.13-rc1)
 CVE-2025-0233 (A vulnerability was found in Codezips Project Management System 
1.0. I ...)
@@ -49976,7 +50086,7 @@ CVE-2024-28882 (OpenVPN from 2.6.0 through 2.6.10 in a 
server role accepts multi
        [bullseye] - openvpn <not-affected> (Vulnerable code not present)
        NOTE: Introduced by: 
https://github.com/OpenVPN/openvpn/commit/d468dff7bdfd79059818c190ddf41b125bb658de
 (v2.6_beta1)
        NOTE: Fixed by: 
https://github.com/OpenVPN/openvpn/commit/65fb67cd6c320a426567b2922c4282fb8738ba3f
 (v2.6.11)
-CVE-2024-5594
+CVE-2024-5594 (OpenVPN before 2.6.11 does not santize PUSH_REPLY messages 
properly wh ...)
        - openvpn 2.6.11-1 (bug #1074488)
        [bookworm] - openvpn <no-dsa> (Minor issue)
        [bullseye] - openvpn <no-dsa> (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d567e015dffa50fe03bef831a245a7ed0b878dc

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d567e015dffa50fe03bef831a245a7ed0b878dc
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to