[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Tue Aug 4 21:10:33 BST 2020



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
5d174aa4 by security tracker role at 2020-08-04T20:10:25+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,471 @@
+CVE-2020-16836
+	RESERVED
+CVE-2020-16835
+	RESERVED
+CVE-2020-16834
+	RESERVED
+CVE-2020-16833
+	RESERVED
+CVE-2020-16832
+	RESERVED
+CVE-2020-16831
+	RESERVED
+CVE-2020-16830
+	RESERVED
+CVE-2020-16829
+	RESERVED
+CVE-2020-16828
+	RESERVED
+CVE-2020-16827
+	RESERVED
+CVE-2020-16826
+	RESERVED
+CVE-2020-16825
+	RESERVED
+CVE-2020-16824
+	RESERVED
+CVE-2020-16823
+	RESERVED
+CVE-2020-16822
+	RESERVED
+CVE-2020-16821
+	RESERVED
+CVE-2020-16820
+	RESERVED
+CVE-2020-16819
+	RESERVED
+CVE-2020-16818
+	RESERVED
+CVE-2020-16817
+	RESERVED
+CVE-2020-16816
+	RESERVED
+CVE-2020-16815
+	RESERVED
+CVE-2020-16814
+	RESERVED
+CVE-2020-16813
+	RESERVED
+CVE-2020-16812
+	RESERVED
+CVE-2020-16811
+	RESERVED
+CVE-2020-16810
+	RESERVED
+CVE-2020-16809
+	RESERVED
+CVE-2020-16808
+	RESERVED
+CVE-2020-16807
+	RESERVED
+CVE-2020-16806
+	RESERVED
+CVE-2020-16805
+	RESERVED
+CVE-2020-16804
+	RESERVED
+CVE-2020-16803
+	RESERVED
+CVE-2020-16802
+	RESERVED
+CVE-2020-16801
+	RESERVED
+CVE-2020-16800
+	RESERVED
+CVE-2020-16799
+	RESERVED
+CVE-2020-16798
+	RESERVED
+CVE-2020-16797
+	RESERVED
+CVE-2020-16796
+	RESERVED
+CVE-2020-16795
+	RESERVED
+CVE-2020-16794
+	RESERVED
+CVE-2020-16793
+	RESERVED
+CVE-2020-16792
+	RESERVED
+CVE-2020-16791
+	RESERVED
+CVE-2020-16790
+	RESERVED
+CVE-2020-16789
+	RESERVED
+CVE-2020-16788
+	RESERVED
+CVE-2020-16787
+	RESERVED
+CVE-2020-16786
+	RESERVED
+CVE-2020-16785
+	RESERVED
+CVE-2020-16784
+	RESERVED
+CVE-2020-16783
+	RESERVED
+CVE-2020-16782
+	RESERVED
+CVE-2020-16781
+	RESERVED
+CVE-2020-16780
+	RESERVED
+CVE-2020-16779
+	RESERVED
+CVE-2020-16778
+	RESERVED
+CVE-2020-16777
+	RESERVED
+CVE-2020-16776
+	RESERVED
+CVE-2020-16775
+	RESERVED
+CVE-2020-16774
+	RESERVED
+CVE-2020-16773
+	RESERVED
+CVE-2020-16772
+	RESERVED
+CVE-2020-16771
+	RESERVED
+CVE-2020-16770
+	RESERVED
+CVE-2020-16769
+	RESERVED
+CVE-2020-16768
+	RESERVED
+CVE-2020-16767
+	RESERVED
+CVE-2020-16766
+	RESERVED
+CVE-2020-16765
+	RESERVED
+CVE-2020-16764
+	RESERVED
+CVE-2020-16763
+	RESERVED
+CVE-2020-16762
+	RESERVED
+CVE-2020-16761
+	RESERVED
+CVE-2020-16760
+	RESERVED
+CVE-2020-16759
+	RESERVED
+CVE-2020-16758
+	RESERVED
+CVE-2020-16757
+	RESERVED
+CVE-2020-16756
+	RESERVED
+CVE-2020-16755
+	RESERVED
+CVE-2020-16754
+	RESERVED
+CVE-2020-16753
+	RESERVED
+CVE-2020-16752
+	RESERVED
+CVE-2020-16751
+	RESERVED
+CVE-2020-16750
+	RESERVED
+CVE-2020-16749
+	RESERVED
+CVE-2020-16748
+	RESERVED
+CVE-2020-16747
+	RESERVED
+CVE-2020-16746
+	RESERVED
+CVE-2020-16745
+	RESERVED
+CVE-2020-16744
+	RESERVED
+CVE-2020-16743
+	RESERVED
+CVE-2020-16742
+	RESERVED
+CVE-2020-16741
+	RESERVED
+CVE-2020-16740
+	RESERVED
+CVE-2020-16739
+	RESERVED
+CVE-2020-16738
+	RESERVED
+CVE-2020-16737
+	RESERVED
+CVE-2020-16736
+	RESERVED
+CVE-2020-16735
+	RESERVED
+CVE-2020-16734
+	RESERVED
+CVE-2020-16733
+	RESERVED
+CVE-2020-16732
+	RESERVED
+CVE-2020-16731
+	RESERVED
+CVE-2020-16730
+	RESERVED
+CVE-2020-16729
+	RESERVED
+CVE-2020-16728
+	RESERVED
+CVE-2020-16727
+	RESERVED
+CVE-2020-16726
+	RESERVED
+CVE-2020-16725
+	RESERVED
+CVE-2020-16724
+	RESERVED
+CVE-2020-16723
+	RESERVED
+CVE-2020-16722
+	RESERVED
+CVE-2020-16721
+	RESERVED
+CVE-2020-16720
+	RESERVED
+CVE-2020-16719
+	RESERVED
+CVE-2020-16718
+	RESERVED
+CVE-2020-16717
+	RESERVED
+CVE-2020-16716
+	RESERVED
+CVE-2020-16715
+	RESERVED
+CVE-2020-16714
+	RESERVED
+CVE-2020-16713
+	RESERVED
+CVE-2020-16712
+	RESERVED
+CVE-2020-16711
+	RESERVED
+CVE-2020-16710
+	RESERVED
+CVE-2020-16709
+	RESERVED
+CVE-2020-16708
+	RESERVED
+CVE-2020-16707
+	RESERVED
+CVE-2020-16706
+	RESERVED
+CVE-2020-16705
+	RESERVED
+CVE-2020-16704
+	RESERVED
+CVE-2020-16703
+	RESERVED
+CVE-2020-16702
+	RESERVED
+CVE-2020-16701
+	RESERVED
+CVE-2020-16700
+	RESERVED
+CVE-2020-16699
+	RESERVED
+CVE-2020-16698
+	RESERVED
+CVE-2020-16697
+	RESERVED
+CVE-2020-16696
+	RESERVED
+CVE-2020-16695
+	RESERVED
+CVE-2020-16694
+	RESERVED
+CVE-2020-16693
+	RESERVED
+CVE-2020-16692
+	RESERVED
+CVE-2020-16691
+	RESERVED
+CVE-2020-16690
+	RESERVED
+CVE-2020-16689
+	RESERVED
+CVE-2020-16688
+	RESERVED
+CVE-2020-16687
+	RESERVED
+CVE-2020-16686
+	RESERVED
+CVE-2020-16685
+	RESERVED
+CVE-2020-16684
+	RESERVED
+CVE-2020-16683
+	RESERVED
+CVE-2020-16682
+	RESERVED
+CVE-2020-16681
+	RESERVED
+CVE-2020-16680
+	RESERVED
+CVE-2020-16679
+	RESERVED
+CVE-2020-16678
+	RESERVED
+CVE-2020-16677
+	RESERVED
+CVE-2020-16676
+	RESERVED
+CVE-2020-16675
+	RESERVED
+CVE-2020-16674
+	RESERVED
+CVE-2020-16673
+	RESERVED
+CVE-2020-16672
+	RESERVED
+CVE-2020-16671
+	RESERVED
+CVE-2020-16670
+	RESERVED
+CVE-2020-16669
+	RESERVED
+CVE-2020-16668
+	RESERVED
+CVE-2020-16667
+	RESERVED
+CVE-2020-16666
+	RESERVED
+CVE-2020-16665
+	RESERVED
+CVE-2020-16664
+	RESERVED
+CVE-2020-16663
+	RESERVED
+CVE-2020-16662
+	RESERVED
+CVE-2020-16661
+	RESERVED
+CVE-2020-16660
+	RESERVED
+CVE-2020-16659
+	RESERVED
+CVE-2020-16658
+	RESERVED
+CVE-2020-16657
+	RESERVED
+CVE-2020-16656
+	RESERVED
+CVE-2020-16655
+	RESERVED
+CVE-2020-16654
+	RESERVED
+CVE-2020-16653
+	RESERVED
+CVE-2020-16652
+	RESERVED
+CVE-2020-16651
+	RESERVED
+CVE-2020-16650
+	RESERVED
+CVE-2020-16649
+	RESERVED
+CVE-2020-16648
+	RESERVED
+CVE-2020-16647
+	RESERVED
+CVE-2020-16646
+	RESERVED
+CVE-2020-16645
+	RESERVED
+CVE-2020-16644
+	RESERVED
+CVE-2020-16643
+	RESERVED
+CVE-2020-16642
+	RESERVED
+CVE-2020-16641
+	RESERVED
+CVE-2020-16640
+	RESERVED
+CVE-2020-16639
+	RESERVED
+CVE-2020-16638
+	RESERVED
+CVE-2020-16637
+	RESERVED
+CVE-2020-16636
+	RESERVED
+CVE-2020-16635
+	RESERVED
+CVE-2020-16634
+	RESERVED
+CVE-2020-16633
+	RESERVED
+CVE-2020-16632
+	RESERVED
+CVE-2020-16631
+	RESERVED
+CVE-2020-16630
+	RESERVED
+CVE-2020-16629
+	RESERVED
+CVE-2020-16628
+	RESERVED
+CVE-2020-16627
+	RESERVED
+CVE-2020-16626
+	RESERVED
+CVE-2020-16625
+	RESERVED
+CVE-2020-16624
+	RESERVED
+CVE-2020-16623
+	RESERVED
+CVE-2020-16622
+	RESERVED
+CVE-2020-16621
+	RESERVED
+CVE-2020-16620
+	RESERVED
+CVE-2020-16619
+	RESERVED
+CVE-2020-16618
+	RESERVED
+CVE-2020-16617
+	RESERVED
+CVE-2020-16616
+	RESERVED
+CVE-2020-16615
+	RESERVED
+CVE-2020-16614
+	RESERVED
+CVE-2020-16613
+	RESERVED
+CVE-2020-16612
+	RESERVED
+CVE-2020-16611
+	RESERVED
+CVE-2020-16610
+	RESERVED
+CVE-2020-16609
+	RESERVED
+CVE-2020-16608
+	RESERVED
+CVE-2020-16607
+	RESERVED
+CVE-2020-16606
+	RESERVED
+CVE-2020-16605
+	RESERVED
+CVE-2020-16604
+	RESERVED
+CVE-2020-16603
+	RESERVED
 CVE-2020-16602
 	RESERVED
 CVE-2020-16601
@@ -799,16 +1267,16 @@ CVE-2020-16205
 	RESERVED
 CVE-2020-16204
 	RESERVED
-CVE-2020-16203
-	RESERVED
+CVE-2020-16203 (Delta Industrial Automation CNCSoft ScreenEditor, Versions 1.01.23 and ...)
+	TODO: check
 CVE-2020-16202
 	RESERVED
-CVE-2020-16201
-	RESERVED
+CVE-2020-16201 (Delta Industrial Automation CNCSoft ScreenEditor, Versions 1.01.23 and ...)
+	TODO: check
 CVE-2020-16200
 	RESERVED
-CVE-2020-16199
-	RESERVED
+CVE-2020-16199 (Delta Industrial Automation CNCSoft ScreenEditor, Versions 1.01.23 and ...)
+	TODO: check
 CVE-2020-16198
 	RESERVED
 CVE-2020-16197
@@ -942,8 +1410,8 @@ CVE-2020-16135 (libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if s
 	NOTE: https://bugs.libssh.org/T232
 	NOTE: https://bugs.libssh.org/rLIBSSHe631ebb3e2247dd25e9678e6827c20dc73b73238
 	NOTE: https://gitlab.com/libssh/libssh-mirror/-/merge_requests/120
-CVE-2020-16134
-	RESERVED
+CVE-2020-16134 (An issue was discovered on Swisscom Internet Box 2, Internet Box Stand ...)
+	TODO: check
 CVE-2020-16133
 	RESERVED
 CVE-2020-16132
@@ -1317,8 +1785,8 @@ CVE-2020-15958
 	RESERVED
 CVE-2020-15957 (An issue was discovered in DP3T-Backend-SDK before 1.1.1 for Decentral ...)
 	NOT-FOR-US: DP3T-Backend-SDK for Decentralised Privacy-Preserving Proximity Tracing (DP3T)
-CVE-2020-15956
-	RESERVED
+CVE-2020-15956 (ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows re ...)
+	TODO: check
 CVE-2020-15955
 	RESERVED
 CVE-2020-15954 (KDE KMail 19.12.3 (aka 5.13.3) engages in unencrypted POP3 communicati ...)
@@ -1360,10 +1828,10 @@ CVE-2020-15945 (Lua through 5.4.0 has a segmentation fault in changedline in lde
 	NOTE: https://github.com/lua/lua/commit/a2195644d89812e5b157ce7bac35543e06db05e3
 	NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00123.html
 	NOTE: check 5.3, 5.2, 5.1 and 5.0 lua versions, different code but might be affected in similar way on updating oldpc value
-CVE-2020-15944
-	RESERVED
-CVE-2020-15943
-	RESERVED
+CVE-2020-15944 (An issue was discovered in the Gantt-Chart module before 5.5.5 for Jir ...)
+	TODO: check
+CVE-2020-15943 (An issue was discovered in the Gantt-Chart module before 5.5.4 for Jir ...)
+	TODO: check
 CVE-2020-15942
 	RESERVED
 CVE-2020-15941
@@ -1563,6 +2031,7 @@ CVE-2020-15863 (hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 0
 	NOTE: https://git.qemu.org/?p=qemu.git;a=commit;h=5519724a13664b43e225ca05351c60b4468e4555
 CVE-2020-15861 [Elevation of Privileges due to symlink handling]
 	RESERVED
+	{DLA-2313-1}
 	- net-snmp 5.8+dfsg-5 (bug #966599)
 	NOTE: https://github.com/net-snmp/net-snmp/issues/145
 	NOTE: https://github.com/net-snmp/net-snmp/commit/4fd9a450444a434a993bc72f7c3486ccce41f602
@@ -2576,8 +3045,8 @@ CVE-2020-15469 (In QEMU 4.2.0, a MemoryRegionOps object may lack read/write call
 	NOTE: Proposed patch(es): https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg09961.html
 CVE-2020-15468 (Persian VIP Download Script 1.0 allows SQL Injection via the cart_edit ...)
 	NOT-FOR-US: Persian VIP Download Script
-CVE-2020-15467
-	RESERVED
+CVE-2020-15467 (The administrative interface of Cohesive Networks vns3:vpn appliances  ...)
+	TODO: check
 CVE-2020-15466 (In Wireshark 3.2.0 to 3.2.4, the GVCP dissector could go into an infin ...)
 	- wireshark 3.2.5-1 (low)
 	[buster] - wireshark <postponed> (Can be fixed along in next 3.0.x DSA)
@@ -7552,10 +8021,10 @@ CVE-2020-13525
 	RESERVED
 CVE-2020-13524
 	RESERVED
-CVE-2020-13523
-	RESERVED
-CVE-2020-13522
-	RESERVED
+CVE-2020-13523 (An exploitable information disclosure vulnerability exists in SoftPerf ...)
+	TODO: check
+CVE-2020-13522 (An exploitable arbitrary file delete vulnerability exists in SoftPerfe ...)
+	TODO: check
 CVE-2020-13521
 	RESERVED
 CVE-2020-13520
@@ -23180,10 +23649,10 @@ CVE-2020-7825 (A vulnerability exists that could allow the execution of operatin
 	NOT-FOR-US: MiPlatform
 CVE-2020-7824
 	RESERVED
-CVE-2020-7823
-	RESERVED
-CVE-2020-7822
-	RESERVED
+CVE-2020-7823 (DaviewIndy has a Memory corruption vulnerability, triggered when the u ...)
+	TODO: check
+CVE-2020-7822 (DaviewIndy has a Heap-based overflow vulnerability, triggered when the ...)
+	TODO: check
 CVE-2020-7821 (Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version contain a  ...)
 	NOT-FOR-US: Nexacro14/17 ExtCommonApiV13 Library
 CVE-2020-7820 (Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version contain a  ...)
@@ -27685,8 +28154,8 @@ CVE-2020-6014
 	RESERVED
 CVE-2020-6013 (ZoneAlarm Firewall and Antivirus products before version 15.8.109.1843 ...)
 	NOT-FOR-US: ZoneAlarm
-CVE-2020-6012
-	RESERVED
+CVE-2020-6012 (ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the  ...)
+	TODO: check
 CVE-2020-6011
 	RESERVED
 CVE-2020-6010 (LearnPress Wordpress plugin version prior and including 3.2.6.7 is vul ...)
@@ -31167,8 +31636,8 @@ CVE-2020-4633
 	RESERVED
 CVE-2020-4632
 	RESERVED
-CVE-2020-4631
-	RESERVED
+CVE-2020-4631 (IBM Spectrum Protect Plus 10.1.0 through 10.1.6 agent files, in non-de ...)
+	TODO: check
 CVE-2020-4630
 	RESERVED
 CVE-2020-4629
@@ -31345,8 +31814,8 @@ CVE-2020-4544
 	RESERVED
 CVE-2020-4543
 	RESERVED
-CVE-2020-4542
-	RESERVED
+CVE-2020-4542 (IBM Jazz Foundation and IBM Engineering products are vulnerable to cro ...)
+	TODO: check
 CVE-2020-4541
 	RESERVED
 CVE-2020-4540
@@ -31379,8 +31848,8 @@ CVE-2020-4527 (IBM Planning Analytics 2.0 could allow a remote attacker to obtai
 	NOT-FOR-US: IBM
 CVE-2020-4526
 	RESERVED
-CVE-2020-4525
-	RESERVED
+CVE-2020-4525 (IBM Jazz Foundation and IBM Engineering products are vulnerable to cro ...)
+	TODO: check
 CVE-2020-4524
 	RESERVED
 CVE-2020-4523
@@ -31511,8 +31980,8 @@ CVE-2020-4461 (IBM Security Access Manager Appliance 9.0.7.1 could allow an auth
 	NOT-FOR-US: IBM
 CVE-2020-4460
 	RESERVED
-CVE-2020-4459
-	RESERVED
+CVE-2020-4459 (IBM Security Verify Access 10.7 contains hard-coded credentials, such  ...)
+	TODO: check
 CVE-2020-4458
 	RESERVED
 CVE-2020-4457
@@ -31609,8 +32078,8 @@ CVE-2020-4412 (The Spectrum Scale 4.2.0.0 through 4.2.3.21 and 5.0.0.0 through 5
 	NOT-FOR-US: IBM
 CVE-2020-4411 (The Spectrum Scale 4.2.0.0 through 4.2.3.21 and 5.0.0.0 through 5.0.4. ...)
 	NOT-FOR-US: IBM
-CVE-2020-4410
-	RESERVED
+CVE-2020-4410 (IBM Jazz Foundation and IBM Engineering products could allow an authen ...)
+	TODO: check
 CVE-2020-4409
 	RESERVED
 CVE-2020-4408 (The IBM QRadar Advisor 1.1 through 2.5.2 with Watson App for IBM QRada ...)
@@ -31637,8 +32106,8 @@ CVE-2020-4398
 	RESERVED
 CVE-2020-4397 (IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 transmits sensitive informati ...)
 	NOT-FOR-US: IBM
-CVE-2020-4396
-	RESERVED
+CVE-2020-4396 (IBM Jazz Foundation and IBM Engineering products are vulnerable to cro ...)
+	TODO: check
 CVE-2020-4395
 	RESERVED
 CVE-2020-4394
@@ -32972,8 +33441,8 @@ CVE-2019-20003 (Feldtech easescreen Crystal 9.0 Web-Services 9.0.1.16265 allows
 	NOT-FOR-US: Feldtech easescreen Crystal 9.0 Web-Services
 CVE-2019-20002 (Formula Injection exists in the export feature in SolarWinds WebHelpDe ...)
 	NOT-FOR-US: SolarWinds WebHelpDesk
-CVE-2019-20001
-	RESERVED
+CVE-2019-20001 (An issue was discovered in RICOH Streamline NX Client Tool and RICOH S ...)
+	TODO: check
 CVE-2019-20000 (The malware scan function in BullGuard Premium Protection 20.0.371.8 h ...)
 	NOT-FOR-US: BullGuard Premium Protection
 CVE-2019-19999 (Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI)  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d174aa49771668314aca87c29c14ce213b0b399

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d174aa49771668314aca87c29c14ce213b0b399
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200804/4c3b8de8/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list