[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso
carnil at debian.org
Thu Sep 24 09:10:25 BST 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
883d6e32 by security tracker role at 2020-09-24T08:10:17+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,425 @@
+CVE-2020-26061
+ RESERVED
+CVE-2020-26060
+ RESERVED
+CVE-2020-26059
+ RESERVED
+CVE-2020-26058
+ RESERVED
+CVE-2020-26057
+ RESERVED
+CVE-2020-26056
+ RESERVED
+CVE-2020-26055
+ RESERVED
+CVE-2020-26054
+ RESERVED
+CVE-2020-26053
+ RESERVED
+CVE-2020-26052
+ RESERVED
+CVE-2020-26051
+ RESERVED
+CVE-2020-26050
+ RESERVED
+CVE-2020-26049
+ RESERVED
+CVE-2020-26048
+ RESERVED
+CVE-2020-26047
+ RESERVED
+CVE-2020-26046
+ RESERVED
+CVE-2020-26045
+ RESERVED
+CVE-2020-26044
+ RESERVED
+CVE-2020-26043
+ RESERVED
+CVE-2020-26042
+ RESERVED
+CVE-2020-26041
+ RESERVED
+CVE-2020-26040
+ RESERVED
+CVE-2020-26039
+ RESERVED
+CVE-2020-26038
+ RESERVED
+CVE-2020-26037
+ RESERVED
+CVE-2020-26036
+ RESERVED
+CVE-2020-26035
+ RESERVED
+CVE-2020-26034
+ RESERVED
+CVE-2020-26033
+ RESERVED
+CVE-2020-26032
+ RESERVED
+CVE-2020-26031
+ RESERVED
+CVE-2020-26030
+ RESERVED
+CVE-2020-26029
+ RESERVED
+CVE-2020-26028
+ RESERVED
+CVE-2020-26027
+ RESERVED
+CVE-2020-26026
+ RESERVED
+CVE-2020-26025
+ RESERVED
+CVE-2020-26024
+ RESERVED
+CVE-2020-26023
+ RESERVED
+CVE-2020-26022
+ RESERVED
+CVE-2020-26021
+ RESERVED
+CVE-2020-26020
+ RESERVED
+CVE-2020-26019
+ RESERVED
+CVE-2020-26018
+ RESERVED
+CVE-2020-26017
+ RESERVED
+CVE-2020-26016
+ RESERVED
+CVE-2020-26015
+ RESERVED
+CVE-2020-26014
+ RESERVED
+CVE-2020-26013
+ RESERVED
+CVE-2020-26012
+ RESERVED
+CVE-2020-26011
+ RESERVED
+CVE-2020-26010
+ RESERVED
+CVE-2020-26009
+ RESERVED
+CVE-2020-26008
+ RESERVED
+CVE-2020-26007
+ RESERVED
+CVE-2020-26006
+ RESERVED
+CVE-2020-26005
+ RESERVED
+CVE-2020-26004
+ RESERVED
+CVE-2020-26003
+ RESERVED
+CVE-2020-26002
+ RESERVED
+CVE-2020-26001
+ RESERVED
+CVE-2020-26000
+ RESERVED
+CVE-2020-25999
+ RESERVED
+CVE-2020-25998
+ RESERVED
+CVE-2020-25997
+ RESERVED
+CVE-2020-25996
+ RESERVED
+CVE-2020-25995
+ RESERVED
+CVE-2020-25994
+ RESERVED
+CVE-2020-25993
+ RESERVED
+CVE-2020-25992
+ RESERVED
+CVE-2020-25991
+ RESERVED
+CVE-2020-25990
+ RESERVED
+CVE-2020-25989
+ RESERVED
+CVE-2020-25988
+ RESERVED
+CVE-2020-25987
+ RESERVED
+CVE-2020-25986
+ RESERVED
+CVE-2020-25985
+ RESERVED
+CVE-2020-25984
+ RESERVED
+CVE-2020-25983
+ RESERVED
+CVE-2020-25982
+ RESERVED
+CVE-2020-25981
+ RESERVED
+CVE-2020-25980
+ RESERVED
+CVE-2020-25979
+ RESERVED
+CVE-2020-25978
+ RESERVED
+CVE-2020-25977
+ RESERVED
+CVE-2020-25976
+ RESERVED
+CVE-2020-25975
+ RESERVED
+CVE-2020-25974
+ RESERVED
+CVE-2020-25973
+ RESERVED
+CVE-2020-25972
+ RESERVED
+CVE-2020-25971
+ RESERVED
+CVE-2020-25970
+ RESERVED
+CVE-2020-25969
+ RESERVED
+CVE-2020-25968
+ RESERVED
+CVE-2020-25967
+ RESERVED
+CVE-2020-25966
+ RESERVED
+CVE-2020-25965
+ RESERVED
+CVE-2020-25964
+ RESERVED
+CVE-2020-25963
+ RESERVED
+CVE-2020-25962
+ RESERVED
+CVE-2020-25961
+ RESERVED
+CVE-2020-25960
+ RESERVED
+CVE-2020-25959
+ RESERVED
+CVE-2020-25958
+ RESERVED
+CVE-2020-25957
+ RESERVED
+CVE-2020-25956
+ RESERVED
+CVE-2020-25955
+ RESERVED
+CVE-2020-25954
+ RESERVED
+CVE-2020-25953
+ RESERVED
+CVE-2020-25952
+ RESERVED
+CVE-2020-25951
+ RESERVED
+CVE-2020-25950
+ RESERVED
+CVE-2020-25949
+ RESERVED
+CVE-2020-25948
+ RESERVED
+CVE-2020-25947
+ RESERVED
+CVE-2020-25946
+ RESERVED
+CVE-2020-25945
+ RESERVED
+CVE-2020-25944
+ RESERVED
+CVE-2020-25943
+ RESERVED
+CVE-2020-25942
+ RESERVED
+CVE-2020-25941
+ RESERVED
+CVE-2020-25940
+ RESERVED
+CVE-2020-25939
+ RESERVED
+CVE-2020-25938
+ RESERVED
+CVE-2020-25937
+ RESERVED
+CVE-2020-25936
+ RESERVED
+CVE-2020-25935
+ RESERVED
+CVE-2020-25934
+ RESERVED
+CVE-2020-25933
+ RESERVED
+CVE-2020-25932
+ RESERVED
+CVE-2020-25931
+ RESERVED
+CVE-2020-25930
+ RESERVED
+CVE-2020-25929
+ RESERVED
+CVE-2020-25928
+ RESERVED
+CVE-2020-25927
+ RESERVED
+CVE-2020-25926
+ RESERVED
+CVE-2020-25925
+ RESERVED
+CVE-2020-25924
+ RESERVED
+CVE-2020-25923
+ RESERVED
+CVE-2020-25922
+ RESERVED
+CVE-2020-25921
+ RESERVED
+CVE-2020-25920
+ RESERVED
+CVE-2020-25919
+ RESERVED
+CVE-2020-25918
+ RESERVED
+CVE-2020-25917
+ RESERVED
+CVE-2020-25916
+ RESERVED
+CVE-2020-25915
+ RESERVED
+CVE-2020-25914
+ RESERVED
+CVE-2020-25913
+ RESERVED
+CVE-2020-25912
+ RESERVED
+CVE-2020-25911
+ RESERVED
+CVE-2020-25910
+ RESERVED
+CVE-2020-25909
+ RESERVED
+CVE-2020-25908
+ RESERVED
+CVE-2020-25907
+ RESERVED
+CVE-2020-25906
+ RESERVED
+CVE-2020-25905
+ RESERVED
+CVE-2020-25904
+ RESERVED
+CVE-2020-25903
+ RESERVED
+CVE-2020-25902
+ RESERVED
+CVE-2020-25901
+ RESERVED
+CVE-2020-25900
+ RESERVED
+CVE-2020-25899
+ RESERVED
+CVE-2020-25898
+ RESERVED
+CVE-2020-25897
+ RESERVED
+CVE-2020-25896
+ RESERVED
+CVE-2020-25895
+ RESERVED
+CVE-2020-25894
+ RESERVED
+CVE-2020-25893
+ RESERVED
+CVE-2020-25892
+ RESERVED
+CVE-2020-25891
+ RESERVED
+CVE-2020-25890
+ RESERVED
+CVE-2020-25889
+ RESERVED
+CVE-2020-25888
+ RESERVED
+CVE-2020-25887
+ RESERVED
+CVE-2020-25886
+ RESERVED
+CVE-2020-25885
+ RESERVED
+CVE-2020-25884
+ RESERVED
+CVE-2020-25883
+ RESERVED
+CVE-2020-25882
+ RESERVED
+CVE-2020-25881
+ RESERVED
+CVE-2020-25880
+ RESERVED
+CVE-2020-25879
+ RESERVED
+CVE-2020-25878
+ RESERVED
+CVE-2020-25877
+ RESERVED
+CVE-2020-25876
+ RESERVED
+CVE-2020-25875
+ RESERVED
+CVE-2020-25874
+ RESERVED
+CVE-2020-25873
+ RESERVED
+CVE-2020-25872
+ RESERVED
+CVE-2020-25871
+ RESERVED
+CVE-2020-25870
+ RESERVED
+CVE-2020-25869
+ RESERVED
+CVE-2020-25868
+ RESERVED
+CVE-2020-25867
+ RESERVED
+CVE-2020-25866
+ RESERVED
+CVE-2020-25865
+ RESERVED
+CVE-2020-25864
+ RESERVED
+CVE-2020-25863
+ RESERVED
+CVE-2020-25862
+ RESERVED
+CVE-2020-25861
+ RESERVED
+CVE-2020-25860
+ RESERVED
+CVE-2020-25859
+ RESERVED
+CVE-2020-25858
+ RESERVED
+CVE-2020-25857
+ RESERVED
+CVE-2020-25856
+ RESERVED
+CVE-2020-25855
+ RESERVED
+CVE-2020-25854
+ RESERVED
+CVE-2020-25853
+ RESERVED
+CVE-2020-25852
+ RESERVED
+CVE-2020-25851
+ RESERVED
CVE-2020-25850
RESERVED
CVE-2020-25849
@@ -539,53 +961,43 @@ CVE-2020-25606
RESERVED
CVE-2020-25605
RESERVED
-CVE-2020-25604 [race when migrating timers between x86 HVM vCPU-s]
- RESERVED
+CVE-2020-25604 (An issue was discovered in Xen through 4.14.x. There is a race conditi ...)
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-336.html
-CVE-2020-25603 [Missing memory barriers when accessing/allocating an event channel]
- RESERVED
+CVE-2020-25603 (An issue was discovered in Xen through 4.14.x. There are missing memor ...)
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-340.html
-CVE-2020-25602 [x86 pv: Crash when handling guest access to MSR_MISC_ENABLE]
- RESERVED
+CVE-2020-25602 (An issue was discovered in Xen through 4.14.x. An x86 PV guest can tri ...)
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-333.html
-CVE-2020-25601 [lack of preemption in evtchn_reset() / evtchn_destroy()]
- RESERVED
+CVE-2020-25601 (An issue was discovered in Xen through 4.14.x. There is a lack of pree ...)
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-344.html
-CVE-2020-25600 [out of bounds event channels available to 32-bit x86 domains]
- RESERVED
+CVE-2020-25600 (An issue was discovered in Xen through 4.14.x. Out of bounds event cha ...)
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-342.html
-CVE-2020-25599 [races with evtchn_reset()]
- RESERVED
+CVE-2020-25599 (An issue was discovered in Xen through 4.14.x. There are evtchn_reset( ...)
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-343.html
-CVE-2020-25598 [Missing unlock in XENMEM_acquire_resource error path]
- RESERVED
+CVE-2020-25598 (An issue was discovered in Xen 4.14.x. There is a missing unlock in th ...)
[experimental] - xen <unfixed>
- xen <not-affected> (No affected version (only > 4.12) ever uploaded to unstable)
NOTE: https://xenbits.xen.org/xsa/advisory-334.html
-CVE-2020-25597 [once valid event channels may not turn invalid]
- RESERVED
+CVE-2020-25597 (An issue was discovered in Xen through 4.14.x. There is mishandling of ...)
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-338.html
-CVE-2020-25596 [x86 pv guest kernel DoS via SYSENTER]
- RESERVED
+CVE-2020-25596 (An issue was discovered in Xen through 4.14.x. x86 PV guest kernels ca ...)
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-339.html
-CVE-2020-25595 [PCI passthrough code reading back hardware registers]
- RESERVED
+CVE-2020-25595 (An issue was discovered in Xen through 4.14.x. The PCI passthrough cod ...)
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-337.html
@@ -2824,8 +3236,8 @@ CVE-2020-24562
RESERVED
CVE-2020-24561 (A command injection vulnerability in Trend Micro ServerProtect for Lin ...)
NOT-FOR-US: Trend Micro
-CVE-2020-24560
- RESERVED
+CVE-2020-24560 (An incomplete SSL server certification validation vulnerability in the ...)
+ TODO: check
CVE-2020-24559 (A vulnerability in Trend Micro Apex One on macOS may allow an attacker ...)
NOT-FOR-US: Trend Micro
CVE-2020-24558 (A vulnerability in an Trend Micro Apex One dll may allow an attacker t ...)
@@ -21276,8 +21688,8 @@ CVE-2020-15606 (This vulnerability allows remote attackers to execute arbitrary
NOT-FOR-US: CentOS-WebPanel.com
CVE-2020-15605 (If LDAP authentication is enabled, an LDAP authentication bypass vulne ...)
NOT-FOR-US: Trend Micro
-CVE-2020-15604
- RESERVED
+CVE-2020-15604 (An incomplete SSL server certification validation vulnerability in the ...)
+ TODO: check
CVE-2020-15603 (An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v1 ...)
NOT-FOR-US: Trend Micro
CVE-2020-15602 (An untrusted search path remote code execution (RCE) vulnerability in ...)
@@ -266886,8 +267298,8 @@ CVE-2015-4721 (Multiple cross-site scripting (XSS) vulnerabilities in Concrete5
NOT-FOR-US: Concrete5
CVE-2015-4720
REJECTED
-CVE-2015-4719
- RESERVED
+CVE-2015-4719 (The client API authentication mechanism in Pexip Infinity before 10 al ...)
+ TODO: check
CVE-2015-4718 (The external SMB storage driver in ownCloud Server before 6.0.8, 7.0.x ...)
{DSA-3373-1}
- owncloud 7.0.6+dfsg-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/883d6e32bdb88a44bbcbf0dce237ce57609eb8b6
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/883d6e32bdb88a44bbcbf0dce237ce57609eb8b6
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200924/fb3498c9/attachment.html>
More information about the debian-security-tracker-commits
mailing list