[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Dec 20 20:10:26 GMT 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d2de03ed by security tracker role at 2021-12-20T20:10:18+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,431 @@
+CVE-2021-45442
+	RESERVED
+CVE-2021-45441
+	RESERVED
+CVE-2021-45440
+	RESERVED
+CVE-2021-45439
+	RESERVED
+CVE-2021-45438
+	RESERVED
+CVE-2021-45437
+	RESERVED
+CVE-2021-45436
+	RESERVED
+CVE-2021-45435
+	RESERVED
+CVE-2021-45434
+	RESERVED
+CVE-2021-45433
+	RESERVED
+CVE-2021-45432
+	RESERVED
+CVE-2021-45431
+	RESERVED
+CVE-2021-45430
+	RESERVED
+CVE-2021-45429
+	RESERVED
+CVE-2021-45428
+	RESERVED
+CVE-2021-45427
+	RESERVED
+CVE-2021-45426
+	RESERVED
+CVE-2021-45425
+	RESERVED
+CVE-2021-45424
+	RESERVED
+CVE-2021-45423
+	RESERVED
+CVE-2021-45422
+	RESERVED
+CVE-2021-45421
+	RESERVED
+CVE-2021-45420
+	RESERVED
+CVE-2021-45419
+	RESERVED
+CVE-2021-45418
+	RESERVED
+CVE-2021-45417
+	RESERVED
+CVE-2021-45416
+	RESERVED
+CVE-2021-45415
+	RESERVED
+CVE-2021-45414
+	RESERVED
+CVE-2021-45413
+	RESERVED
+CVE-2021-45412
+	RESERVED
+CVE-2021-45411
+	RESERVED
+CVE-2021-45410
+	RESERVED
+CVE-2021-45409
+	RESERVED
+CVE-2021-45408
+	RESERVED
+CVE-2021-45407
+	RESERVED
+CVE-2021-45406
+	RESERVED
+CVE-2021-45405
+	RESERVED
+CVE-2021-45404
+	RESERVED
+CVE-2021-45403
+	RESERVED
+CVE-2021-45402
+	RESERVED
+CVE-2021-45401
+	RESERVED
+CVE-2021-45400
+	RESERVED
+CVE-2021-45399
+	RESERVED
+CVE-2021-45398
+	RESERVED
+CVE-2021-45397
+	RESERVED
+CVE-2021-45396
+	RESERVED
+CVE-2021-45395
+	RESERVED
+CVE-2021-45394
+	RESERVED
+CVE-2021-45393
+	RESERVED
+CVE-2021-45392
+	RESERVED
+CVE-2021-45391
+	RESERVED
+CVE-2021-45390
+	RESERVED
+CVE-2021-45389
+	RESERVED
+CVE-2021-45388
+	RESERVED
+CVE-2021-45387
+	RESERVED
+CVE-2021-45386
+	RESERVED
+CVE-2021-45385
+	RESERVED
+CVE-2021-45384
+	RESERVED
+CVE-2021-45383
+	RESERVED
+CVE-2021-45382
+	RESERVED
+CVE-2021-45381
+	RESERVED
+CVE-2021-45380
+	RESERVED
+CVE-2021-45379
+	RESERVED
+CVE-2021-45378
+	RESERVED
+CVE-2021-45377
+	RESERVED
+CVE-2021-45376
+	RESERVED
+CVE-2021-45375
+	RESERVED
+CVE-2021-45374
+	RESERVED
+CVE-2021-45373
+	RESERVED
+CVE-2021-45372
+	RESERVED
+CVE-2021-45371
+	RESERVED
+CVE-2021-45370
+	RESERVED
+CVE-2021-45369
+	RESERVED
+CVE-2021-45368
+	RESERVED
+CVE-2021-45367
+	RESERVED
+CVE-2021-45366
+	RESERVED
+CVE-2021-45365
+	RESERVED
+CVE-2021-45364
+	RESERVED
+CVE-2021-45363
+	RESERVED
+CVE-2021-45362
+	RESERVED
+CVE-2021-45361
+	RESERVED
+CVE-2021-45360
+	RESERVED
+CVE-2021-45359
+	RESERVED
+CVE-2021-45358
+	RESERVED
+CVE-2021-45357
+	RESERVED
+CVE-2021-45356
+	RESERVED
+CVE-2021-45355
+	RESERVED
+CVE-2021-45354
+	RESERVED
+CVE-2021-45353
+	RESERVED
+CVE-2021-45352
+	RESERVED
+CVE-2021-45351
+	RESERVED
+CVE-2021-45350
+	RESERVED
+CVE-2021-45349
+	RESERVED
+CVE-2021-45348
+	RESERVED
+CVE-2021-45347
+	RESERVED
+CVE-2021-45346
+	RESERVED
+CVE-2021-45345
+	RESERVED
+CVE-2021-45344
+	RESERVED
+CVE-2021-45343
+	RESERVED
+CVE-2021-45342
+	RESERVED
+CVE-2021-45341
+	RESERVED
+CVE-2021-45340
+	RESERVED
+CVE-2021-45339
+	RESERVED
+CVE-2021-45338
+	RESERVED
+CVE-2021-45337
+	RESERVED
+CVE-2021-45336
+	RESERVED
+CVE-2021-45335
+	RESERVED
+CVE-2021-45334
+	RESERVED
+CVE-2021-45333
+	RESERVED
+CVE-2021-45332
+	RESERVED
+CVE-2021-45331
+	RESERVED
+CVE-2021-45330
+	RESERVED
+CVE-2021-45329
+	RESERVED
+CVE-2021-45328
+	RESERVED
+CVE-2021-45327
+	RESERVED
+CVE-2021-45326
+	RESERVED
+CVE-2021-45325
+	RESERVED
+CVE-2021-45324
+	RESERVED
+CVE-2021-45323
+	RESERVED
+CVE-2021-45322
+	RESERVED
+CVE-2021-45321
+	RESERVED
+CVE-2021-45320
+	RESERVED
+CVE-2021-45319
+	RESERVED
+CVE-2021-45318
+	RESERVED
+CVE-2021-45317
+	RESERVED
+CVE-2021-45316
+	RESERVED
+CVE-2021-45315
+	RESERVED
+CVE-2021-45314
+	RESERVED
+CVE-2021-45313
+	RESERVED
+CVE-2021-45312
+	RESERVED
+CVE-2021-45311
+	RESERVED
+CVE-2021-45310
+	RESERVED
+CVE-2021-45309
+	RESERVED
+CVE-2021-45308
+	RESERVED
+CVE-2021-45307
+	RESERVED
+CVE-2021-45306
+	RESERVED
+CVE-2021-45305
+	RESERVED
+CVE-2021-45304
+	RESERVED
+CVE-2021-45303
+	RESERVED
+CVE-2021-45302
+	RESERVED
+CVE-2021-45301
+	RESERVED
+CVE-2021-45300
+	RESERVED
+CVE-2021-45299
+	RESERVED
+CVE-2021-45298
+	RESERVED
+CVE-2021-45297
+	RESERVED
+CVE-2021-45296
+	RESERVED
+CVE-2021-45295
+	RESERVED
+CVE-2021-45294
+	RESERVED
+CVE-2021-45293
+	RESERVED
+CVE-2021-45292
+	RESERVED
+CVE-2021-45291
+	RESERVED
+CVE-2021-45290
+	RESERVED
+CVE-2021-45289
+	RESERVED
+CVE-2021-45288
+	RESERVED
+CVE-2021-45287
+	RESERVED
+CVE-2021-45286
+	RESERVED
+CVE-2021-45285
+	RESERVED
+CVE-2021-45284
+	RESERVED
+CVE-2021-45283
+	RESERVED
+CVE-2021-45282
+	RESERVED
+CVE-2021-45281
+	RESERVED
+CVE-2021-45280
+	RESERVED
+CVE-2021-45279
+	RESERVED
+CVE-2021-45278
+	RESERVED
+CVE-2021-45277
+	RESERVED
+CVE-2021-45276
+	RESERVED
+CVE-2021-45275
+	RESERVED
+CVE-2021-45274
+	RESERVED
+CVE-2021-45273
+	RESERVED
+CVE-2021-45272
+	RESERVED
+CVE-2021-45271
+	RESERVED
+CVE-2021-45270
+	RESERVED
+CVE-2021-45269
+	RESERVED
+CVE-2021-45268
+	RESERVED
+CVE-2021-45267
+	RESERVED
+CVE-2021-45266
+	RESERVED
+CVE-2021-45265
+	RESERVED
+CVE-2021-45264
+	RESERVED
+CVE-2021-45263
+	RESERVED
+CVE-2021-45262
+	RESERVED
+CVE-2021-45261
+	RESERVED
+CVE-2021-45260
+	RESERVED
+CVE-2021-45259
+	RESERVED
+CVE-2021-45258
+	RESERVED
+CVE-2021-45257
+	RESERVED
+CVE-2021-45256
+	RESERVED
+CVE-2021-45255
+	RESERVED
+CVE-2021-45254
+	RESERVED
+CVE-2021-45253
+	RESERVED
+CVE-2021-45252
+	RESERVED
+CVE-2021-45251
+	RESERVED
+CVE-2021-45250
+	RESERVED
+CVE-2021-45249
+	RESERVED
+CVE-2021-45248
+	RESERVED
+CVE-2021-45247
+	RESERVED
+CVE-2021-45246
+	RESERVED
+CVE-2021-45245
+	RESERVED
+CVE-2021-45244
+	RESERVED
+CVE-2021-45243
+	RESERVED
+CVE-2021-45242
+	RESERVED
+CVE-2021-45241
+	RESERVED
+CVE-2021-45240
+	RESERVED
+CVE-2021-45239
+	RESERVED
+CVE-2021-45238
+	RESERVED
+CVE-2021-45237
+	RESERVED
+CVE-2021-45236
+	RESERVED
+CVE-2021-45235
+	RESERVED
+CVE-2021-45234
+	RESERVED
+CVE-2021-4142
+	RESERVED
+CVE-2021-4141
+	RESERVED
+CVE-2021-4140
+	RESERVED
+CVE-2021-4139
+	RESERVED
+CVE-2021-4138
+	RESERVED
 CVE-2022-22053
 	RESERVED
 CVE-2022-22052
@@ -1211,8 +1639,8 @@ CVE-2021-44918
 	RESERVED
 CVE-2021-44917
 	RESERVED
-CVE-2021-44916
-	RESERVED
+CVE-2021-44916 (Opmantek Open-AudIT Community 4.2.0 (Fixed in 4.3.0) is affected by a  ...)
+	TODO: check
 CVE-2021-44915
 	RESERVED
 CVE-2021-44914
@@ -1327,8 +1755,7 @@ CVE-2021-44860
 	RESERVED
 CVE-2021-44859
 	RESERVED
-CVE-2021-44858 [Unauthorized users can view contents of private wikis using various actions]
-	RESERVED
+CVE-2021-44858 (An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36 ...)
 	{DSA-5021-1 DLA-2847-1}
 	- mediawiki 1:1.35.5-1
 	[buster] - mediawiki 1:1.31.16-1+deb10u2
@@ -1586,8 +2013,7 @@ CVE-2021-44792
 	RESERVED
 CVE-2021-44791
 	RESERVED
-CVE-2021-44790 [Possible buffer overflow when parsing multipart content in mod_lua]
-	RESERVED
+CVE-2021-44790 (A carefully crafted request body can cause a buffer overflow in the mo ...)
 	- apache2 2.4.52-1
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-44790
 	NOTE: Fixed by: https://svn.apache.org/r1896039
@@ -1803,8 +2229,8 @@ CVE-2021-44733 [use-after-free in the TEE subsystem]
 	- linux <unfixed>
 	[stretch] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2030747
-CVE-2021-44732
-	RESERVED
+CVE-2021-44732 (Mbed TLS before 3.0.1 has a double free in certain out-of-memory condi ...)
+	TODO: check
 CVE-2021-44731
 	RESERVED
 CVE-2021-44730
@@ -1957,10 +2383,10 @@ CVE-2021-44678 (An issue (2 of 6) was discovered in Veritas Enterprise Vault thr
 	NOT-FOR-US: Veritas
 CVE-2021-44677 (An issue (1 of 6) was discovered in Veritas Enterprise Vault through 1 ...)
 	NOT-FOR-US: Veritas
-CVE-2021-44676
-	RESERVED
-CVE-2021-44675
-	RESERVED
+CVE-2021-44676 (Zoho ManageEngine Access Manager Plus before 4203 allows anyone to vie ...)
+	TODO: check
+CVE-2021-44675 (Zoho ManageEngine ServiceDesk Plus MSP before 10.5 Build 10534 is vuln ...)
+	TODO: check
 CVE-2021-4075 (snipe-it is vulnerable to Server-Side Request Forgery (SSRF) ...)
 	NOT-FOR-US: snipe-it
 CVE-2021-4074
@@ -2211,8 +2637,8 @@ CVE-2021-44556 (National Library of the Netherlands digger < 6697d1269d981e35
 	NOT-FOR-US: National Library of the Netherlands digger
 CVE-2021-44555
 	RESERVED
-CVE-2021-44554
-	RESERVED
+CVE-2021-44554 (Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate  ...)
+	TODO: check
 CVE-2021-44553
 	RESERVED
 CVE-2021-44552
@@ -2383,8 +2809,8 @@ CVE-2021-44527 (A vulnerability found in UniFi Switch firmware Version 5.43.35 a
 	NOT-FOR-US: UniFi Switch firmware
 CVE-2021-44526
 	RESERVED
-CVE-2021-44525
-	RESERVED
+CVE-2021-44525 (Zoho ManageEngine PAM360 before build 5303 allows attackers to modify  ...)
+	TODO: check
 CVE-2021-44524 (A vulnerability has been identified in SiPass integrated V2.76 (All ve ...)
 	NOT-FOR-US: SiPass
 CVE-2021-44523 (A vulnerability has been identified in SiPass integrated V2.76 (All ve ...)
@@ -3000,8 +3426,8 @@ CVE-2021-44265
 	RESERVED
 CVE-2021-44264
 	RESERVED
-CVE-2021-44263
-	RESERVED
+CVE-2021-44263 (Gurock TestRail before 7.2.4 mishandles HTML escaping. ...)
+	TODO: check
 CVE-2021-44262
 	RESERVED
 CVE-2021-44261
@@ -3233,8 +3659,7 @@ CVE-2021-44225 (In Keepalived through 2.2.4, the D-Bus policy does not sufficien
 	[stretch] - keepalived <no-dsa> (Minor issue)
 	NOTE: https://github.com/acassen/keepalived/pull/2063
 	NOTE: https://github.com/acassen/keepalived/commit/7977fec0be89ae6fe87405b3f8da2f0b5e415e3d
-CVE-2021-44224 [Possible NULL dereference or SSRF in forward proxy configurations]
-	RESERVED
+CVE-2021-44224 (A crafted URI sent to httpd configured as a forward proxy (ProxyReques ...)
 	- apache2 2.4.52-1
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-44224
 	NOTE: Fixed by: https://svn.apache.org/r1895955
@@ -6309,8 +6734,8 @@ CVE-2021-43442
 	RESERVED
 CVE-2021-43441
 	RESERVED
-CVE-2021-43440
-	RESERVED
+CVE-2021-43440 (Multiple Stored XSS Vulnerabilities in the Source Code of iOrder 1.0 a ...)
+	TODO: check
 CVE-2021-43439
 	RESERVED
 CVE-2021-43438
@@ -8576,8 +9001,8 @@ CVE-2021-42915
 	RESERVED
 CVE-2021-42914
 	RESERVED
-CVE-2021-42913
-	RESERVED
+CVE-2021-42913 (The SyncThru Web Service on Samsung SCX-6x55X printers allows an attac ...)
+	TODO: check
 CVE-2021-42912 (FiberHome ONU GPON AN5506-04-F RP2617 is affected by an OS command inj ...)
 	NOT-FOR-US: FiberHome ONU GPON AN5506-04-F RP2617
 CVE-2021-42911
@@ -13030,8 +13455,7 @@ CVE-2021-41563 (Tad Book3 editing book function does not filter special characte
 	NOT-FOR-US: Tad Book3
 CVE-2021-41562 (A vulnerability in Snow Snow Agent for Windows allows a non-admin user ...)
 	NOT-FOR-US: Snow Snow Agent for Windows
-CVE-2021-41561
-	RESERVED
+CVE-2021-41561 (Improper Input Validation vulnerability in Parquet-MR of Apache Parque ...)
 	NOT-FOR-US: Apache Parquet
 CVE-2021-3825 (On 2.1.15 version and below of Lider module in LiderAhenk software is  ...)
 	NOT-FOR-US: LiderAhenk
@@ -127295,8 +127719,8 @@ CVE-2020-8107
 	RESERVED
 CVE-2020-8106
 	REJECTED
-CVE-2020-8105
-	RESERVED
+CVE-2020-8105 (OS Command Injection vulnerability in the wirelessConnect handler of A ...)
+	TODO: check
 CVE-2020-8104
 	RESERVED
 CVE-2020-8103 (A vulnerability in the improper handling of symbolic links in Bitdefen ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d2de03ed0d8fbf747961ef375729e3591f0133f8

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d2de03ed0d8fbf747961ef375729e3591f0133f8
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211220/be52b3f0/attachment.htm>


More information about the debian-security-tracker-commits mailing list