[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Fri Mar 6 08:10:22 GMT 2020



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
61ec016d by security tracker role at 2020-03-06T08:10:14+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,19 @@
+CVE-2020-10187
+	RESERVED
+CVE-2020-10186
+	RESERVED
+CVE-2020-10185 (The sync endpoint in YubiKey Validation Server before 2.40 allows remo ...)
+	TODO: check
+CVE-2020-10184 (The verify endpoint in YubiKey Validation Server before 2.40 does not  ...)
+	TODO: check
+CVE-2020-10183
+	RESERVED
+CVE-2020-10182
+	RESERVED
+CVE-2020-10181
+	RESERVED
+CVE-2019-20502 (An issue was discovered in EFS Easy Chat Server 3.1. There is a buffer ...)
+	TODO: check
 CVE-2020-10180 (The ESET AV parsing engine allows virus-detection bypass via a crafted ...)
 	NOT-FOR-US: ESET AV parsing engine
 CVE-2020-10179
@@ -1306,16 +1322,19 @@ CVE-2020-9549 (In PDFResurrect 0.12 through 0.19, get_type in pdf.c has an out-o
 	NOTE: https://github.com/enferex/pdfresurrect/issues/8
 	NOTE: Crash in CLI tool, no security impact
 CVE-2020-9548 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interact ...)
+	{DLA-2135-1}
 	- jackson-databind <unfixed>
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2634
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by
 	NOTE: but still an issue when Default Typing is enabled.
 CVE-2020-9547 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interact ...)
+	{DLA-2135-1}
 	- jackson-databind <unfixed>
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2634
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by
 	NOTE: but still an issue when Default Typing is enabled.
 CVE-2020-9546 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interact ...)
+	{DLA-2135-1}
 	- jackson-databind <unfixed>
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2631
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by
@@ -7176,8 +7195,8 @@ CVE-2020-6988
 	RESERVED
 CVE-2020-6987
 	RESERVED
-CVE-2020-6986
-	RESERVED
+CVE-2020-6986 (In all versions of Omron PLC CJ Series, an attacker can send a series  ...)
+	TODO: check
 CVE-2020-6985
 	RESERVED
 CVE-2020-6984
@@ -7206,8 +7225,8 @@ CVE-2020-6973 (Digi International ConnectPort LTS 32 MEI, Firmware Version 1.4.3
 	NOT-FOR-US: Digi International ConnectPort LTS 32 MEI
 CVE-2020-6972
 	RESERVED
-CVE-2020-6971
-	RESERVED
+CVE-2020-6971 (In Emerson ValveLink v12.0.264 to v13.4.118, a vulnerability in the Va ...)
+	TODO: check
 CVE-2020-6970 (A Heap-based Buffer Overflow was found in Emerson OpenEnterprise SCADA ...)
 	NOT-FOR-US: Emerson OpenEnterprise SCADA Server
 CVE-2020-6969 (It is possible to unmask credentials and other sensitive information o ...)
@@ -9438,8 +9457,8 @@ CVE-2020-5959
 	RESERVED
 CVE-2020-5958
 	RESERVED
-CVE-2020-5957
-	RESERVED
+CVE-2020-5957 (NVIDIA Windows GPU Display Driver, all versions, contains a vulnerabil ...)
+	TODO: check
 CVE-2019-20358 (Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below  ...)
 	NOT-FOR-US: Trend Micro
 CVE-2019-20357 (A Persistent Arbitrary Code Execution vulnerability exists in the Tren ...)
@@ -28545,10 +28564,10 @@ CVE-2019-17649
 	RESERVED
 CVE-2019-17648
 	RESERVED
-CVE-2019-17647
-	RESERVED
-CVE-2019-17646
-	RESERVED
+CVE-2019-17647 (An issue was discovered in Centreon before 2.8.30, 18.10.8, 19.04.5, a ...)
+	TODO: check
+CVE-2019-17646 (An issue was discovered in Centreon before 18.10.8, 19.04.5, and 19.10 ...)
+	TODO: check
 CVE-2019-17645 (An issue was discovered in Centreon before 2.8.31, 18.10.9, 19.04.6, a ...)
 	- centreon-web <itp> (bug #913903)
 CVE-2019-17644 (An issue was discovered in Centreon before 2.8-30, 18.10-8, 19.04-5, a ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/61ec016d611b8ec64cd8ebbbae5f948a2785985e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/61ec016d611b8ec64cd8ebbbae5f948a2785985e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200306/3ef11eba/attachment.html>


More information about the debian-security-tracker-commits mailing list