[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Thu Sep 24 09:10:25 BST 2020



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
883d6e32 by security tracker role at 2020-09-24T08:10:17+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,425 @@
+CVE-2020-26061
+	RESERVED
+CVE-2020-26060
+	RESERVED
+CVE-2020-26059
+	RESERVED
+CVE-2020-26058
+	RESERVED
+CVE-2020-26057
+	RESERVED
+CVE-2020-26056
+	RESERVED
+CVE-2020-26055
+	RESERVED
+CVE-2020-26054
+	RESERVED
+CVE-2020-26053
+	RESERVED
+CVE-2020-26052
+	RESERVED
+CVE-2020-26051
+	RESERVED
+CVE-2020-26050
+	RESERVED
+CVE-2020-26049
+	RESERVED
+CVE-2020-26048
+	RESERVED
+CVE-2020-26047
+	RESERVED
+CVE-2020-26046
+	RESERVED
+CVE-2020-26045
+	RESERVED
+CVE-2020-26044
+	RESERVED
+CVE-2020-26043
+	RESERVED
+CVE-2020-26042
+	RESERVED
+CVE-2020-26041
+	RESERVED
+CVE-2020-26040
+	RESERVED
+CVE-2020-26039
+	RESERVED
+CVE-2020-26038
+	RESERVED
+CVE-2020-26037
+	RESERVED
+CVE-2020-26036
+	RESERVED
+CVE-2020-26035
+	RESERVED
+CVE-2020-26034
+	RESERVED
+CVE-2020-26033
+	RESERVED
+CVE-2020-26032
+	RESERVED
+CVE-2020-26031
+	RESERVED
+CVE-2020-26030
+	RESERVED
+CVE-2020-26029
+	RESERVED
+CVE-2020-26028
+	RESERVED
+CVE-2020-26027
+	RESERVED
+CVE-2020-26026
+	RESERVED
+CVE-2020-26025
+	RESERVED
+CVE-2020-26024
+	RESERVED
+CVE-2020-26023
+	RESERVED
+CVE-2020-26022
+	RESERVED
+CVE-2020-26021
+	RESERVED
+CVE-2020-26020
+	RESERVED
+CVE-2020-26019
+	RESERVED
+CVE-2020-26018
+	RESERVED
+CVE-2020-26017
+	RESERVED
+CVE-2020-26016
+	RESERVED
+CVE-2020-26015
+	RESERVED
+CVE-2020-26014
+	RESERVED
+CVE-2020-26013
+	RESERVED
+CVE-2020-26012
+	RESERVED
+CVE-2020-26011
+	RESERVED
+CVE-2020-26010
+	RESERVED
+CVE-2020-26009
+	RESERVED
+CVE-2020-26008
+	RESERVED
+CVE-2020-26007
+	RESERVED
+CVE-2020-26006
+	RESERVED
+CVE-2020-26005
+	RESERVED
+CVE-2020-26004
+	RESERVED
+CVE-2020-26003
+	RESERVED
+CVE-2020-26002
+	RESERVED
+CVE-2020-26001
+	RESERVED
+CVE-2020-26000
+	RESERVED
+CVE-2020-25999
+	RESERVED
+CVE-2020-25998
+	RESERVED
+CVE-2020-25997
+	RESERVED
+CVE-2020-25996
+	RESERVED
+CVE-2020-25995
+	RESERVED
+CVE-2020-25994
+	RESERVED
+CVE-2020-25993
+	RESERVED
+CVE-2020-25992
+	RESERVED
+CVE-2020-25991
+	RESERVED
+CVE-2020-25990
+	RESERVED
+CVE-2020-25989
+	RESERVED
+CVE-2020-25988
+	RESERVED
+CVE-2020-25987
+	RESERVED
+CVE-2020-25986
+	RESERVED
+CVE-2020-25985
+	RESERVED
+CVE-2020-25984
+	RESERVED
+CVE-2020-25983
+	RESERVED
+CVE-2020-25982
+	RESERVED
+CVE-2020-25981
+	RESERVED
+CVE-2020-25980
+	RESERVED
+CVE-2020-25979
+	RESERVED
+CVE-2020-25978
+	RESERVED
+CVE-2020-25977
+	RESERVED
+CVE-2020-25976
+	RESERVED
+CVE-2020-25975
+	RESERVED
+CVE-2020-25974
+	RESERVED
+CVE-2020-25973
+	RESERVED
+CVE-2020-25972
+	RESERVED
+CVE-2020-25971
+	RESERVED
+CVE-2020-25970
+	RESERVED
+CVE-2020-25969
+	RESERVED
+CVE-2020-25968
+	RESERVED
+CVE-2020-25967
+	RESERVED
+CVE-2020-25966
+	RESERVED
+CVE-2020-25965
+	RESERVED
+CVE-2020-25964
+	RESERVED
+CVE-2020-25963
+	RESERVED
+CVE-2020-25962
+	RESERVED
+CVE-2020-25961
+	RESERVED
+CVE-2020-25960
+	RESERVED
+CVE-2020-25959
+	RESERVED
+CVE-2020-25958
+	RESERVED
+CVE-2020-25957
+	RESERVED
+CVE-2020-25956
+	RESERVED
+CVE-2020-25955
+	RESERVED
+CVE-2020-25954
+	RESERVED
+CVE-2020-25953
+	RESERVED
+CVE-2020-25952
+	RESERVED
+CVE-2020-25951
+	RESERVED
+CVE-2020-25950
+	RESERVED
+CVE-2020-25949
+	RESERVED
+CVE-2020-25948
+	RESERVED
+CVE-2020-25947
+	RESERVED
+CVE-2020-25946
+	RESERVED
+CVE-2020-25945
+	RESERVED
+CVE-2020-25944
+	RESERVED
+CVE-2020-25943
+	RESERVED
+CVE-2020-25942
+	RESERVED
+CVE-2020-25941
+	RESERVED
+CVE-2020-25940
+	RESERVED
+CVE-2020-25939
+	RESERVED
+CVE-2020-25938
+	RESERVED
+CVE-2020-25937
+	RESERVED
+CVE-2020-25936
+	RESERVED
+CVE-2020-25935
+	RESERVED
+CVE-2020-25934
+	RESERVED
+CVE-2020-25933
+	RESERVED
+CVE-2020-25932
+	RESERVED
+CVE-2020-25931
+	RESERVED
+CVE-2020-25930
+	RESERVED
+CVE-2020-25929
+	RESERVED
+CVE-2020-25928
+	RESERVED
+CVE-2020-25927
+	RESERVED
+CVE-2020-25926
+	RESERVED
+CVE-2020-25925
+	RESERVED
+CVE-2020-25924
+	RESERVED
+CVE-2020-25923
+	RESERVED
+CVE-2020-25922
+	RESERVED
+CVE-2020-25921
+	RESERVED
+CVE-2020-25920
+	RESERVED
+CVE-2020-25919
+	RESERVED
+CVE-2020-25918
+	RESERVED
+CVE-2020-25917
+	RESERVED
+CVE-2020-25916
+	RESERVED
+CVE-2020-25915
+	RESERVED
+CVE-2020-25914
+	RESERVED
+CVE-2020-25913
+	RESERVED
+CVE-2020-25912
+	RESERVED
+CVE-2020-25911
+	RESERVED
+CVE-2020-25910
+	RESERVED
+CVE-2020-25909
+	RESERVED
+CVE-2020-25908
+	RESERVED
+CVE-2020-25907
+	RESERVED
+CVE-2020-25906
+	RESERVED
+CVE-2020-25905
+	RESERVED
+CVE-2020-25904
+	RESERVED
+CVE-2020-25903
+	RESERVED
+CVE-2020-25902
+	RESERVED
+CVE-2020-25901
+	RESERVED
+CVE-2020-25900
+	RESERVED
+CVE-2020-25899
+	RESERVED
+CVE-2020-25898
+	RESERVED
+CVE-2020-25897
+	RESERVED
+CVE-2020-25896
+	RESERVED
+CVE-2020-25895
+	RESERVED
+CVE-2020-25894
+	RESERVED
+CVE-2020-25893
+	RESERVED
+CVE-2020-25892
+	RESERVED
+CVE-2020-25891
+	RESERVED
+CVE-2020-25890
+	RESERVED
+CVE-2020-25889
+	RESERVED
+CVE-2020-25888
+	RESERVED
+CVE-2020-25887
+	RESERVED
+CVE-2020-25886
+	RESERVED
+CVE-2020-25885
+	RESERVED
+CVE-2020-25884
+	RESERVED
+CVE-2020-25883
+	RESERVED
+CVE-2020-25882
+	RESERVED
+CVE-2020-25881
+	RESERVED
+CVE-2020-25880
+	RESERVED
+CVE-2020-25879
+	RESERVED
+CVE-2020-25878
+	RESERVED
+CVE-2020-25877
+	RESERVED
+CVE-2020-25876
+	RESERVED
+CVE-2020-25875
+	RESERVED
+CVE-2020-25874
+	RESERVED
+CVE-2020-25873
+	RESERVED
+CVE-2020-25872
+	RESERVED
+CVE-2020-25871
+	RESERVED
+CVE-2020-25870
+	RESERVED
+CVE-2020-25869
+	RESERVED
+CVE-2020-25868
+	RESERVED
+CVE-2020-25867
+	RESERVED
+CVE-2020-25866
+	RESERVED
+CVE-2020-25865
+	RESERVED
+CVE-2020-25864
+	RESERVED
+CVE-2020-25863
+	RESERVED
+CVE-2020-25862
+	RESERVED
+CVE-2020-25861
+	RESERVED
+CVE-2020-25860
+	RESERVED
+CVE-2020-25859
+	RESERVED
+CVE-2020-25858
+	RESERVED
+CVE-2020-25857
+	RESERVED
+CVE-2020-25856
+	RESERVED
+CVE-2020-25855
+	RESERVED
+CVE-2020-25854
+	RESERVED
+CVE-2020-25853
+	RESERVED
+CVE-2020-25852
+	RESERVED
+CVE-2020-25851
+	RESERVED
 CVE-2020-25850
 	RESERVED
 CVE-2020-25849
@@ -539,53 +961,43 @@ CVE-2020-25606
 	RESERVED
 CVE-2020-25605
 	RESERVED
-CVE-2020-25604 [race when migrating timers between x86 HVM vCPU-s]
-	RESERVED
+CVE-2020-25604 (An issue was discovered in Xen through 4.14.x. There is a race conditi ...)
 	- xen <unfixed>
 	[stretch] - xen <end-of-life> (DSA 4602-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-336.html
-CVE-2020-25603 [Missing memory barriers when accessing/allocating an event channel]
-	RESERVED
+CVE-2020-25603 (An issue was discovered in Xen through 4.14.x. There are missing memor ...)
 	- xen <unfixed>
 	[stretch] - xen <end-of-life> (DSA 4602-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-340.html
-CVE-2020-25602 [x86 pv: Crash when handling guest access to MSR_MISC_ENABLE]
-	RESERVED
+CVE-2020-25602 (An issue was discovered in Xen through 4.14.x. An x86 PV guest can tri ...)
 	- xen <unfixed>
 	[stretch] - xen <end-of-life> (DSA 4602-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-333.html
-CVE-2020-25601 [lack of preemption in evtchn_reset() / evtchn_destroy()]
-	RESERVED
+CVE-2020-25601 (An issue was discovered in Xen through 4.14.x. There is a lack of pree ...)
 	- xen <unfixed>
 	[stretch] - xen <end-of-life> (DSA 4602-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-344.html
-CVE-2020-25600 [out of bounds event channels available to 32-bit x86 domains]
-	RESERVED
+CVE-2020-25600 (An issue was discovered in Xen through 4.14.x. Out of bounds event cha ...)
 	- xen <unfixed>
 	[stretch] - xen <end-of-life> (DSA 4602-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-342.html
-CVE-2020-25599 [races with evtchn_reset()]
-	RESERVED
+CVE-2020-25599 (An issue was discovered in Xen through 4.14.x. There are evtchn_reset( ...)
 	- xen <unfixed>
 	[stretch] - xen <end-of-life> (DSA 4602-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-343.html
-CVE-2020-25598 [Missing unlock in XENMEM_acquire_resource error path]
-	RESERVED
+CVE-2020-25598 (An issue was discovered in Xen 4.14.x. There is a missing unlock in th ...)
 	[experimental] - xen <unfixed>
 	- xen <not-affected> (No affected version (only > 4.12) ever uploaded to unstable)
 	NOTE: https://xenbits.xen.org/xsa/advisory-334.html
-CVE-2020-25597 [once valid event channels may not turn invalid]
-	RESERVED
+CVE-2020-25597 (An issue was discovered in Xen through 4.14.x. There is mishandling of ...)
 	- xen <unfixed>
 	[stretch] - xen <end-of-life> (DSA 4602-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-338.html
-CVE-2020-25596 [x86 pv guest kernel DoS via SYSENTER]
-	RESERVED
+CVE-2020-25596 (An issue was discovered in Xen through 4.14.x. x86 PV guest kernels ca ...)
 	- xen <unfixed>
 	[stretch] - xen <end-of-life> (DSA 4602-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-339.html
-CVE-2020-25595 [PCI passthrough code reading back hardware registers]
-	RESERVED
+CVE-2020-25595 (An issue was discovered in Xen through 4.14.x. The PCI passthrough cod ...)
 	- xen <unfixed>
 	[stretch] - xen <end-of-life> (DSA 4602-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-337.html
@@ -2824,8 +3236,8 @@ CVE-2020-24562
 	RESERVED
 CVE-2020-24561 (A command injection vulnerability in Trend Micro ServerProtect for Lin ...)
 	NOT-FOR-US: Trend Micro
-CVE-2020-24560
-	RESERVED
+CVE-2020-24560 (An incomplete SSL server certification validation vulnerability in the ...)
+	TODO: check
 CVE-2020-24559 (A vulnerability in Trend Micro Apex One on macOS may allow an attacker ...)
 	NOT-FOR-US: Trend Micro
 CVE-2020-24558 (A vulnerability in an Trend Micro Apex One dll may allow an attacker t ...)
@@ -21276,8 +21688,8 @@ CVE-2020-15606 (This vulnerability allows remote attackers to execute arbitrary
 	NOT-FOR-US: CentOS-WebPanel.com
 CVE-2020-15605 (If LDAP authentication is enabled, an LDAP authentication bypass vulne ...)
 	NOT-FOR-US: Trend Micro
-CVE-2020-15604
-	RESERVED
+CVE-2020-15604 (An incomplete SSL server certification validation vulnerability in the ...)
+	TODO: check
 CVE-2020-15603 (An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v1 ...)
 	NOT-FOR-US: Trend Micro
 CVE-2020-15602 (An untrusted search path remote code execution (RCE) vulnerability in  ...)
@@ -266886,8 +267298,8 @@ CVE-2015-4721 (Multiple cross-site scripting (XSS) vulnerabilities in Concrete5
 	NOT-FOR-US: Concrete5
 CVE-2015-4720
 	REJECTED
-CVE-2015-4719
-	RESERVED
+CVE-2015-4719 (The client API authentication mechanism in Pexip Infinity before 10 al ...)
+	TODO: check
 CVE-2015-4718 (The external SMB storage driver in ownCloud Server before 6.0.8, 7.0.x ...)
 	{DSA-3373-1}
 	- owncloud 7.0.6+dfsg-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/883d6e32bdb88a44bbcbf0dce237ce57609eb8b6

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/883d6e32bdb88a44bbcbf0dce237ce57609eb8b6
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200924/fb3498c9/attachment.html>


More information about the debian-security-tracker-commits mailing list