[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Aug 30 09:10:31 BST 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
664bc9aa by security tracker role at 2021-08-30T08:10:22+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,299 @@
+CVE-2021-40319
+ RESERVED
+CVE-2021-40318
+ RESERVED
+CVE-2021-40317
+ RESERVED
+CVE-2021-40316
+ RESERVED
+CVE-2021-40315
+ RESERVED
+CVE-2021-40314
+ RESERVED
+CVE-2021-40313
+ RESERVED
+CVE-2021-40312
+ RESERVED
+CVE-2021-40311
+ RESERVED
+CVE-2021-40310
+ RESERVED
+CVE-2021-40309
+ RESERVED
+CVE-2021-40308
+ RESERVED
+CVE-2021-40307
+ RESERVED
+CVE-2021-40306
+ RESERVED
+CVE-2021-40305
+ RESERVED
+CVE-2021-40304
+ RESERVED
+CVE-2021-40303
+ RESERVED
+CVE-2021-40302
+ RESERVED
+CVE-2021-40301
+ RESERVED
+CVE-2021-40300
+ RESERVED
+CVE-2021-40299
+ RESERVED
+CVE-2021-40298
+ RESERVED
+CVE-2021-40297
+ RESERVED
+CVE-2021-40296
+ RESERVED
+CVE-2021-40295
+ RESERVED
+CVE-2021-40294
+ RESERVED
+CVE-2021-40293
+ RESERVED
+CVE-2021-40292
+ RESERVED
+CVE-2021-40291
+ RESERVED
+CVE-2021-40290
+ RESERVED
+CVE-2021-40289
+ RESERVED
+CVE-2021-40288
+ RESERVED
+CVE-2021-40287
+ RESERVED
+CVE-2021-40286
+ RESERVED
+CVE-2021-40285
+ RESERVED
+CVE-2021-40284
+ RESERVED
+CVE-2021-40283
+ RESERVED
+CVE-2021-40282
+ RESERVED
+CVE-2021-40281
+ RESERVED
+CVE-2021-40280
+ RESERVED
+CVE-2021-40279
+ RESERVED
+CVE-2021-40278
+ RESERVED
+CVE-2021-40277
+ RESERVED
+CVE-2021-40276
+ RESERVED
+CVE-2021-40275
+ RESERVED
+CVE-2021-40274
+ RESERVED
+CVE-2021-40273
+ RESERVED
+CVE-2021-40272
+ RESERVED
+CVE-2021-40271
+ RESERVED
+CVE-2021-40270
+ RESERVED
+CVE-2021-40269
+ RESERVED
+CVE-2021-40268
+ RESERVED
+CVE-2021-40267
+ RESERVED
+CVE-2021-40266
+ RESERVED
+CVE-2021-40265
+ RESERVED
+CVE-2021-40264
+ RESERVED
+CVE-2021-40263
+ RESERVED
+CVE-2021-40262
+ RESERVED
+CVE-2021-40261
+ RESERVED
+CVE-2021-40260
+ RESERVED
+CVE-2021-40259
+ RESERVED
+CVE-2021-40258
+ RESERVED
+CVE-2021-40257
+ RESERVED
+CVE-2021-40256
+ RESERVED
+CVE-2021-40255
+ RESERVED
+CVE-2021-40254
+ RESERVED
+CVE-2021-40253
+ RESERVED
+CVE-2021-40252
+ RESERVED
+CVE-2021-40251
+ RESERVED
+CVE-2021-40250
+ RESERVED
+CVE-2021-40249
+ RESERVED
+CVE-2021-40248
+ RESERVED
+CVE-2021-40247
+ RESERVED
+CVE-2021-40246
+ RESERVED
+CVE-2021-40245
+ RESERVED
+CVE-2021-40244
+ RESERVED
+CVE-2021-40243
+ RESERVED
+CVE-2021-40242
+ RESERVED
+CVE-2021-40241
+ RESERVED
+CVE-2021-40240
+ RESERVED
+CVE-2021-40239
+ RESERVED
+CVE-2021-40238
+ RESERVED
+CVE-2021-40237
+ RESERVED
+CVE-2021-40236
+ RESERVED
+CVE-2021-40235
+ RESERVED
+CVE-2021-40234
+ RESERVED
+CVE-2021-40233
+ RESERVED
+CVE-2021-40232
+ RESERVED
+CVE-2021-40231
+ RESERVED
+CVE-2021-40230
+ RESERVED
+CVE-2021-40229
+ RESERVED
+CVE-2021-40228
+ RESERVED
+CVE-2021-40227
+ RESERVED
+CVE-2021-40226
+ RESERVED
+CVE-2021-40225
+ RESERVED
+CVE-2021-40224
+ RESERVED
+CVE-2021-40223
+ RESERVED
+CVE-2021-40222
+ RESERVED
+CVE-2021-40221
+ RESERVED
+CVE-2021-40220
+ RESERVED
+CVE-2021-40219
+ RESERVED
+CVE-2021-40218
+ RESERVED
+CVE-2021-40217
+ RESERVED
+CVE-2021-40216
+ RESERVED
+CVE-2021-40215
+ RESERVED
+CVE-2021-40214
+ RESERVED
+CVE-2021-40213
+ RESERVED
+CVE-2021-40212
+ RESERVED
+CVE-2021-40211
+ RESERVED
+CVE-2021-40210
+ RESERVED
+CVE-2021-40209
+ RESERVED
+CVE-2021-40208
+ RESERVED
+CVE-2021-40207
+ RESERVED
+CVE-2021-40206
+ RESERVED
+CVE-2021-40205
+ RESERVED
+CVE-2021-40204
+ RESERVED
+CVE-2021-40203
+ RESERVED
+CVE-2021-40202
+ RESERVED
+CVE-2021-40201
+ RESERVED
+CVE-2021-40200
+ RESERVED
+CVE-2021-40199
+ RESERVED
+CVE-2021-40198
+ RESERVED
+CVE-2021-40197
+ RESERVED
+CVE-2021-40196
+ RESERVED
+CVE-2021-40195
+ RESERVED
+CVE-2021-40194
+ RESERVED
+CVE-2021-40193
+ RESERVED
+CVE-2021-40192
+ RESERVED
+CVE-2021-40191
+ RESERVED
+CVE-2021-40190
+ RESERVED
+CVE-2021-40189
+ RESERVED
+CVE-2021-40188
+ RESERVED
+CVE-2021-40187
+ RESERVED
+CVE-2021-40186
+ RESERVED
+CVE-2021-40185
+ RESERVED
+CVE-2021-40184
+ RESERVED
+CVE-2021-40183
+ RESERVED
+CVE-2021-40182
+ RESERVED
+CVE-2021-40181
+ RESERVED
+CVE-2021-40180
+ RESERVED
+CVE-2021-40179
+ RESERVED
+CVE-2021-40178 (Zoho ManageEngine Log360 before Build 5224 allows stored XSS via the L ...)
+ TODO: check
+CVE-2021-40177 (Zoho ManageEngine Log360 before Build 5225 allows remote code executio ...)
+ TODO: check
+CVE-2021-40176 (Zoho ManageEngine Log360 before Build 5225 allows stored XSS. ...)
+ TODO: check
+CVE-2021-40175 (Zoho ManageEngine Log360 before Build 5219 allows unrestricted file up ...)
+ TODO: check
+CVE-2021-40174 (Zoho ManageEngine Log360 before Build 5224 allows a CSRF attack for di ...)
+ TODO: check
+CVE-2021-40173 (Zoho ManageEngine Cloud Security Plus before Build 4117 allows a CSRF ...)
+ TODO: check
+CVE-2021-40172 (Zoho ManageEngine Log360 before Build 5219 allows a CSRF attack on pro ...)
+ TODO: check
CVE-2021-40171
RESERVED
CVE-2021-40170
@@ -1947,15 +2243,14 @@ CVE-2021-39274 (In XeroSecurity Sn1per 9.0 (free version), insecure directory pe
NOT-FOR-US: XeroSecurity Sn1per
CVE-2021-39273 (In XeroSecurity Sn1per 9.0 (free version), insecure permissions (0777) ...)
NOT-FOR-US: XeroSecurity Sn1per
-CVE-2021-39272 [TLS bypass vulnerabilities ("NO STARTTLS")]
- RESERVED
+CVE-2021-39272 (Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption i ...)
- fetchmail <unfixed> (bug #993163)
[bullseye] - fetchmail <no-dsa> (Minor issue; safe recommendations exists, implicit TLS, "ssl" mode exist)
[buster] - fetchmail <no-dsa> (Minor issue; safe recommendations exists, implicit TLS, "ssl" mode exist)
[stretch] - fetchmail <no-dsa> (Minor issue; safe recommendations exists, implicit TLS, "ssl" mode exist)
NOTE: https://www.fetchmail.info/fetchmail-SA-2021-02.txt
-CVE-2021-39271
- RESERVED
+CVE-2021-39271 (OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code ex ...)
+ TODO: check
CVE-2021-39270 (In Ping Identity RSA SecurID Integration Kit before 3.2, user imperson ...)
NOT-FOR-US: Ping Identity RSA SecurID Integration Kit
CVE-2021-39269
@@ -2326,20 +2621,20 @@ CVE-2021-39119
RESERVED
CVE-2021-39118
RESERVED
-CVE-2021-39117
- RESERVED
+CVE-2021-39117 (The AssociateFieldToScreens page in Atlassian Jira Server and Data Cen ...)
+ TODO: check
CVE-2021-39116
RESERVED
CVE-2021-39115
RESERVED
CVE-2021-39114
RESERVED
-CVE-2021-39113
- RESERVED
+CVE-2021-39113 (Affected versions of Atlassian Jira Server and Data Center allow anony ...)
+ TODO: check
CVE-2021-39112 (Affected versions of Atlassian Jira Server and Data Center allow remot ...)
NOT-FOR-US: Atlassian
-CVE-2021-39111
- RESERVED
+CVE-2021-39111 (The Editor plugin in Atlassian Jira Server and Data Center before vers ...)
+ TODO: check
CVE-2021-39110
RESERVED
CVE-2021-39109
@@ -3877,8 +4172,7 @@ CVE-2021-38387 (In Contiki 3.0, a Telnet server that silently quits (before disc
NOT-FOR-US: Contiki
CVE-2021-38386 (In Contiki 3.0, a buffer overflow in the Telnet service allows remote ...)
NOT-FOR-US: Contiki
-CVE-2021-38385
- RESERVED
+CVE-2021-38385 (Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship ...)
{DSA-4961-1}
- tor 0.4.5.10-1
[stretch] - tor <end-of-life> (See DSA 4644)
@@ -5403,8 +5697,8 @@ CVE-2021-37751
CVE-2021-37750 (The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before ...)
- krb5 1.18.3-7 (bug #992607)
NOTE: https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
-CVE-2021-37749
- RESERVED
+CVE-2021-37749 (MapService.svc in Hexagon GeoMedia WebMap 2020 before Update 2 (aka 16 ...)
+ TODO: check
CVE-2021-37748
RESERVED
CVE-2021-37747
@@ -8510,8 +8804,8 @@ CVE-2021-36361
RESERVED
CVE-2021-36360
RESERVED
-CVE-2021-36359
- RESERVED
+CVE-2021-36359 (OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remo ...)
+ TODO: check
CVE-2021-36358
RESERVED
CVE-2021-36357
@@ -20721,7 +21015,7 @@ CVE-2021-31294
CVE-2021-31293
RESERVED
CVE-2021-31292 (An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows att ...)
- {DSA-4958-1}
+ {DSA-4958-1 DLA-2750-1}
- exiv2 <unfixed> (bug #991706)
[bullseye] - exiv2 0.27.3-3+deb11u1
NOTE: https://github.com/Exiv2/exiv2/issues/1530
@@ -24278,7 +24572,7 @@ CVE-2021-30002 (An issue was discovered in the Linux kernel before 5.11.3 when a
[buster] - linux 4.19.181-1
NOTE: https://git.kernel.org/linus/fb18802a338b36f675a388fc03d2aa504a0d0899
CVE-2021-3482 (A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. ...)
- {DSA-4958-1}
+ {DSA-4958-1 DLA-2750-1}
- exiv2 <unfixed> (bug #986888)
[bullseye] - exiv2 <no-dsa> (Minor issue)
NOTE: https://github.com/Exiv2/exiv2/issues/1522
@@ -25408,7 +25702,7 @@ CVE-2021-29475 (HedgeDoc (formerly known as CodiMD) is an open-source collaborat
CVE-2021-29474 (HedgeDoc (formerly known as CodiMD) is an open-source collaborative ma ...)
NOT-FOR-US: HedgeDoc
CVE-2021-29473 (Exiv2 is a C++ library and a command-line utility to read, write, dele ...)
- {DSA-4958-1}
+ {DSA-4958-1 DLA-2750-1}
- exiv2 <unfixed> (bug #987736)
[bullseye] - exiv2 <no-dsa> (Minor issue)
NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2
@@ -25490,7 +25784,7 @@ CVE-2021-29458 (Exiv2 is a command-line utility and C++ library for reading, wri
NOTE: https://github.com/Exiv2/exiv2/commit/fadb68718eb1bff3bd3222bd26ff3328f5306730
NOTE: https://github.com/Exiv2/exiv2/commit/06d2db6e5fd2fcca9c060e95fc97f8a5b5d4c22d
CVE-2021-29457 (Exiv2 is a command-line utility and C++ library for reading, writing, ...)
- {DSA-4958-1}
+ {DSA-4958-1 DLA-2750-1}
- exiv2 <unfixed> (bug #991705)
[bullseye] - exiv2 0.27.3-3+deb11u1
NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm
@@ -33740,8 +34034,8 @@ CVE-2021-26086 (Affected versions of Atlassian Jira Server and Data Center allow
NOT-FOR-US: Atlassian
CVE-2021-26085 (Affected versions of Atlassian Confluence Server allow remote attacker ...)
NOT-FOR-US: Atlassian Confluence
-CVE-2021-26084
- RESERVED
+CVE-2021-26084 (In affected versions of Confluence Server and Data Center, an OGNL inj ...)
+ TODO: check
CVE-2021-26083 (Export HTML Report in Atlassian Jira Server and Jira Data Center befor ...)
NOT-FOR-US: Atlassian
CVE-2021-26082 (The XML Export in Atlassian Jira Server and Jira Data Center before ve ...)
@@ -109290,7 +109584,7 @@ CVE-2019-20422 (In the Linux kernel before 5.3.4, fib6_rule_lookup in net/ipv6/i
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/7b09c2d052db4b4ad0b27b97918b46a7746966fa
CVE-2019-20421 (In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input ...)
- {DSA-4958-1}
+ {DSA-4958-1 DLA-2750-1}
- exiv2 0.27.2-8 (low; bug #950183)
[jessie] - exiv2 <ignored> (Minor issue)
NOTE: https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/664bc9aa795a4ad9308561354b818ccc3aa0eeb5
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/664bc9aa795a4ad9308561354b818ccc3aa0eeb5
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210830/983111ac/attachment.htm>
More information about the debian-security-tracker-commits
mailing list