[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu May 13 09:10:25 BST 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f212ddaf by security tracker role at 2021-05-13T08:10:16+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,619 @@
+CVE-2021-32923
+ RESERVED
+CVE-2021-32922
+ RESERVED
+CVE-2021-32921
+ RESERVED
+CVE-2021-32920
+ RESERVED
+CVE-2021-32919
+ RESERVED
+CVE-2021-32918
+ RESERVED
+CVE-2021-32917
+ RESERVED
+CVE-2021-32916
+ RESERVED
+CVE-2021-32915
+ RESERVED
+CVE-2021-32914
+ RESERVED
+CVE-2021-32913
+ RESERVED
+CVE-2021-32912
+ RESERVED
+CVE-2021-32911
+ RESERVED
+CVE-2021-32910
+ RESERVED
+CVE-2021-32909
+ RESERVED
+CVE-2021-32908
+ RESERVED
+CVE-2021-32907
+ RESERVED
+CVE-2021-32906
+ RESERVED
+CVE-2021-32905
+ RESERVED
+CVE-2021-32904
+ RESERVED
+CVE-2021-32903
+ RESERVED
+CVE-2021-32902
+ RESERVED
+CVE-2021-32901
+ RESERVED
+CVE-2021-32900
+ RESERVED
+CVE-2021-32899
+ RESERVED
+CVE-2021-32898
+ RESERVED
+CVE-2021-32897
+ RESERVED
+CVE-2021-32896
+ RESERVED
+CVE-2021-32895
+ RESERVED
+CVE-2021-32894
+ RESERVED
+CVE-2021-32893
+ RESERVED
+CVE-2021-32892
+ RESERVED
+CVE-2021-32891
+ RESERVED
+CVE-2021-32890
+ RESERVED
+CVE-2021-32889
+ RESERVED
+CVE-2021-32888
+ RESERVED
+CVE-2021-32887
+ RESERVED
+CVE-2021-32886
+ RESERVED
+CVE-2021-32885
+ RESERVED
+CVE-2021-32884
+ RESERVED
+CVE-2021-32883
+ RESERVED
+CVE-2021-32882
+ RESERVED
+CVE-2021-32881
+ RESERVED
+CVE-2021-32880
+ RESERVED
+CVE-2021-32879
+ RESERVED
+CVE-2021-32878
+ RESERVED
+CVE-2021-32877
+ RESERVED
+CVE-2021-32876
+ RESERVED
+CVE-2021-32875
+ RESERVED
+CVE-2021-32874
+ RESERVED
+CVE-2021-32873
+ RESERVED
+CVE-2021-32872
+ RESERVED
+CVE-2021-32871
+ RESERVED
+CVE-2021-32870
+ RESERVED
+CVE-2021-32869
+ RESERVED
+CVE-2021-32868
+ RESERVED
+CVE-2021-32867
+ RESERVED
+CVE-2021-32866
+ RESERVED
+CVE-2021-32865
+ RESERVED
+CVE-2021-32864
+ RESERVED
+CVE-2021-32863
+ RESERVED
+CVE-2021-32862
+ RESERVED
+CVE-2021-32861
+ RESERVED
+CVE-2021-32860
+ RESERVED
+CVE-2021-32859
+ RESERVED
+CVE-2021-32858
+ RESERVED
+CVE-2021-32857
+ RESERVED
+CVE-2021-32856
+ RESERVED
+CVE-2021-32855
+ RESERVED
+CVE-2021-32854
+ RESERVED
+CVE-2021-32853
+ RESERVED
+CVE-2021-32852
+ RESERVED
+CVE-2021-32851
+ RESERVED
+CVE-2021-32850
+ RESERVED
+CVE-2021-32849
+ RESERVED
+CVE-2021-32848
+ RESERVED
+CVE-2021-32847
+ RESERVED
+CVE-2021-32846
+ RESERVED
+CVE-2021-32845
+ RESERVED
+CVE-2021-32844
+ RESERVED
+CVE-2021-32843
+ RESERVED
+CVE-2021-32842
+ RESERVED
+CVE-2021-32841
+ RESERVED
+CVE-2021-32840
+ RESERVED
+CVE-2021-32839
+ RESERVED
+CVE-2021-32838
+ RESERVED
+CVE-2021-32837
+ RESERVED
+CVE-2021-32836
+ RESERVED
+CVE-2021-32835
+ RESERVED
+CVE-2021-32834
+ RESERVED
+CVE-2021-32833
+ RESERVED
+CVE-2021-32832
+ RESERVED
+CVE-2021-32831
+ RESERVED
+CVE-2021-32830
+ RESERVED
+CVE-2021-32829
+ RESERVED
+CVE-2021-32828
+ RESERVED
+CVE-2021-32827
+ RESERVED
+CVE-2021-32826
+ RESERVED
+CVE-2021-32825
+ RESERVED
+CVE-2021-32824
+ RESERVED
+CVE-2021-32823
+ RESERVED
+CVE-2021-32822
+ RESERVED
+CVE-2021-32821
+ RESERVED
+CVE-2021-32820
+ RESERVED
+CVE-2021-32819
+ RESERVED
+CVE-2021-32818
+ RESERVED
+CVE-2021-32817
+ RESERVED
+CVE-2021-32816
+ RESERVED
+CVE-2021-32815
+ RESERVED
+CVE-2021-32814
+ RESERVED
+CVE-2021-32813
+ RESERVED
+CVE-2021-32812
+ RESERVED
+CVE-2021-32811
+ RESERVED
+CVE-2021-32810
+ RESERVED
+CVE-2021-32809
+ RESERVED
+CVE-2021-32808
+ RESERVED
+CVE-2021-32807
+ RESERVED
+CVE-2021-32806
+ RESERVED
+CVE-2021-32805
+ RESERVED
+CVE-2021-32804
+ RESERVED
+CVE-2021-32803
+ RESERVED
+CVE-2021-32802
+ RESERVED
+CVE-2021-32801
+ RESERVED
+CVE-2021-32800
+ RESERVED
+CVE-2021-32799
+ RESERVED
+CVE-2021-32798
+ RESERVED
+CVE-2021-32797
+ RESERVED
+CVE-2021-32796
+ RESERVED
+CVE-2021-32795
+ RESERVED
+CVE-2021-32794
+ RESERVED
+CVE-2021-32793
+ RESERVED
+CVE-2021-32792
+ RESERVED
+CVE-2021-32791
+ RESERVED
+CVE-2021-32790
+ RESERVED
+CVE-2021-32789
+ RESERVED
+CVE-2021-32788
+ RESERVED
+CVE-2021-32787
+ RESERVED
+CVE-2021-32786
+ RESERVED
+CVE-2021-32785
+ RESERVED
+CVE-2021-32784
+ RESERVED
+CVE-2021-32783
+ RESERVED
+CVE-2021-32782
+ RESERVED
+CVE-2021-32781
+ RESERVED
+CVE-2021-32780
+ RESERVED
+CVE-2021-32779
+ RESERVED
+CVE-2021-32778
+ RESERVED
+CVE-2021-32777
+ RESERVED
+CVE-2021-32776
+ RESERVED
+CVE-2021-32775
+ RESERVED
+CVE-2021-32774
+ RESERVED
+CVE-2021-32773
+ RESERVED
+CVE-2021-32772
+ RESERVED
+CVE-2021-32771
+ RESERVED
+CVE-2021-32770
+ RESERVED
+CVE-2021-32769
+ RESERVED
+CVE-2021-32768
+ RESERVED
+CVE-2021-32767
+ RESERVED
+CVE-2021-32766
+ RESERVED
+CVE-2021-32765
+ RESERVED
+CVE-2021-32764
+ RESERVED
+CVE-2021-32763
+ RESERVED
+CVE-2021-32762
+ RESERVED
+CVE-2021-32761
+ RESERVED
+CVE-2021-32760
+ RESERVED
+CVE-2021-32759
+ RESERVED
+CVE-2021-32758
+ RESERVED
+CVE-2021-32757
+ RESERVED
+CVE-2021-32756
+ RESERVED
+CVE-2021-32755
+ RESERVED
+CVE-2021-32754
+ RESERVED
+CVE-2021-32753
+ RESERVED
+CVE-2021-32752
+ RESERVED
+CVE-2021-32751
+ RESERVED
+CVE-2021-32750
+ RESERVED
+CVE-2021-32749
+ RESERVED
+CVE-2021-32748
+ RESERVED
+CVE-2021-32747
+ RESERVED
+CVE-2021-32746
+ RESERVED
+CVE-2021-32745
+ RESERVED
+CVE-2021-32744
+ RESERVED
+CVE-2021-32743
+ RESERVED
+CVE-2021-32742
+ RESERVED
+CVE-2021-32741
+ RESERVED
+CVE-2021-32740
+ RESERVED
+CVE-2021-32739
+ RESERVED
+CVE-2021-32738
+ RESERVED
+CVE-2021-32737
+ RESERVED
+CVE-2021-32736
+ RESERVED
+CVE-2021-32735
+ RESERVED
+CVE-2021-32734
+ RESERVED
+CVE-2021-32733
+ RESERVED
+CVE-2021-32732
+ RESERVED
+CVE-2021-32731
+ RESERVED
+CVE-2021-32730
+ RESERVED
+CVE-2021-32729
+ RESERVED
+CVE-2021-32728
+ RESERVED
+CVE-2021-32727
+ RESERVED
+CVE-2021-32726
+ RESERVED
+CVE-2021-32725
+ RESERVED
+CVE-2021-32724
+ RESERVED
+CVE-2021-32723
+ RESERVED
+CVE-2021-32722
+ RESERVED
+CVE-2021-32721
+ RESERVED
+CVE-2021-32720
+ RESERVED
+CVE-2021-32719
+ RESERVED
+CVE-2021-32718
+ RESERVED
+CVE-2021-32717
+ RESERVED
+CVE-2021-32716
+ RESERVED
+CVE-2021-32715
+ RESERVED
+CVE-2021-32714
+ RESERVED
+CVE-2021-32713
+ RESERVED
+CVE-2021-32712
+ RESERVED
+CVE-2021-32711
+ RESERVED
+CVE-2021-32710
+ RESERVED
+CVE-2021-32709
+ RESERVED
+CVE-2021-32708
+ RESERVED
+CVE-2021-32707
+ RESERVED
+CVE-2021-32706
+ RESERVED
+CVE-2021-32705
+ RESERVED
+CVE-2021-32704
+ RESERVED
+CVE-2021-32703
+ RESERVED
+CVE-2021-32702
+ RESERVED
+CVE-2021-32701
+ RESERVED
+CVE-2021-32700
+ RESERVED
+CVE-2021-32699
+ RESERVED
+CVE-2021-32698
+ RESERVED
+CVE-2021-32697
+ RESERVED
+CVE-2021-32696
+ RESERVED
+CVE-2021-32695
+ RESERVED
+CVE-2021-32694
+ RESERVED
+CVE-2021-32693
+ RESERVED
+CVE-2021-32692
+ RESERVED
+CVE-2021-32691
+ RESERVED
+CVE-2021-32690
+ RESERVED
+CVE-2021-32689
+ RESERVED
+CVE-2021-32688
+ RESERVED
+CVE-2021-32687
+ RESERVED
+CVE-2021-32686
+ RESERVED
+CVE-2021-32685
+ RESERVED
+CVE-2021-32684
+ RESERVED
+CVE-2021-32683
+ RESERVED
+CVE-2021-32682
+ RESERVED
+CVE-2021-32681
+ RESERVED
+CVE-2021-32680
+ RESERVED
+CVE-2021-32679
+ RESERVED
+CVE-2021-32678
+ RESERVED
+CVE-2021-32677
+ RESERVED
+CVE-2021-32676
+ RESERVED
+CVE-2021-32675
+ RESERVED
+CVE-2021-32674
+ RESERVED
+CVE-2021-32673
+ RESERVED
+CVE-2021-32672
+ RESERVED
+CVE-2021-32671
+ RESERVED
+CVE-2021-32670
+ RESERVED
+CVE-2021-32669
+ RESERVED
+CVE-2021-32668
+ RESERVED
+CVE-2021-32667
+ RESERVED
+CVE-2021-32666
+ RESERVED
+CVE-2021-32665
+ RESERVED
+CVE-2021-32664
+ RESERVED
+CVE-2021-32663
+ RESERVED
+CVE-2021-32662
+ RESERVED
+CVE-2021-32661
+ RESERVED
+CVE-2021-32660
+ RESERVED
+CVE-2021-32659
+ RESERVED
+CVE-2021-32658
+ RESERVED
+CVE-2021-32657
+ RESERVED
+CVE-2021-32656
+ RESERVED
+CVE-2021-32655
+ RESERVED
+CVE-2021-32654
+ RESERVED
+CVE-2021-32653
+ RESERVED
+CVE-2021-32652
+ RESERVED
+CVE-2021-32651
+ RESERVED
+CVE-2021-32650
+ RESERVED
+CVE-2021-32649
+ RESERVED
+CVE-2021-32648
+ RESERVED
+CVE-2021-32647
+ RESERVED
+CVE-2021-32646
+ RESERVED
+CVE-2021-32645
+ RESERVED
+CVE-2021-32644
+ RESERVED
+CVE-2021-32643
+ RESERVED
+CVE-2021-32642
+ RESERVED
+CVE-2021-32641
+ RESERVED
+CVE-2021-32640
+ RESERVED
+CVE-2021-32639
+ RESERVED
+CVE-2021-32638
+ RESERVED
+CVE-2021-32637
+ RESERVED
+CVE-2021-32636
+ RESERVED
+CVE-2021-32635
+ RESERVED
+CVE-2021-32634
+ RESERVED
+CVE-2021-32633
+ RESERVED
+CVE-2021-32632
+ RESERVED
+CVE-2021-32631
+ RESERVED
+CVE-2021-32630
+ RESERVED
+CVE-2021-32629
+ RESERVED
+CVE-2021-32628
+ RESERVED
+CVE-2021-32627
+ RESERVED
+CVE-2021-32626
+ RESERVED
+CVE-2021-32625
+ RESERVED
+CVE-2021-32624
+ RESERVED
+CVE-2021-32623
+ RESERVED
+CVE-2021-32622
+ RESERVED
+CVE-2021-32621
+ RESERVED
+CVE-2021-32620
+ RESERVED
+CVE-2021-32619
+ RESERVED
+CVE-2021-32618
+ RESERVED
+CVE-2021-32617
+ RESERVED
+CVE-2021-32616
+ RESERVED
CVE-2021-3549
RESERVED
CVE-2021-32615
@@ -1336,10 +1952,13 @@ CVE-2021-32030 (The administrator application on ASUS GT-AC2900 devices before 3
NOT-FOR-US: ASUS
CVE-2021-32029
RESERVED
+ {DSA-4915-1}
CVE-2021-32028
RESERVED
+ {DSA-4915-1}
CVE-2021-32027
RESERVED
+ {DSA-4915-1}
CVE-2018-25014 [heap-based buffer overflow in ReadSymbol()]
RESERVED
- libwebp <unfixed>
@@ -3290,8 +3909,7 @@ CVE-2021-31217
RESERVED
CVE-2021-31216
RESERVED
-CVE-2021-31215
- RESERVED
+CVE-2021-31215 (SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11. ...)
- slurm-wlm <unfixed> (bug #988439)
- slurm-llnl <removed>
NOTE: https://github.com/SchedMD/slurm/commit/a9e9e2fedbd200ca545ab67dd753bd52c919f236 (2.11.7)
@@ -8932,8 +9550,8 @@ CVE-2021-28801
RESERVED
CVE-2021-28800
RESERVED
-CVE-2021-28799
- RESERVED
+CVE-2021-28799 (An improper authorization vulnerability has been reported to affect QN ...)
+ TODO: check
CVE-2021-28798
RESERVED
CVE-2021-28797 (A stack-based buffer overflow vulnerability has been reported to affec ...)
@@ -17286,10 +17904,10 @@ CVE-2021-25331 (Improper access control in Samsung Pay mini application prior to
NOT-FOR-US: Samsung Pay mini application
CVE-2021-25330 (Calling of non-existent provider in MobileWips application prior to SM ...)
NOT-FOR-US: MobileWips application
-CVE-2020-36198
- RESERVED
-CVE-2020-36197
- RESERVED
+CVE-2020-36198 (A command injection vulnerability has been reported to affect certain ...)
+ TODO: check
+CVE-2020-36197 (An improper access control vulnerability has been reported to affect e ...)
+ TODO: check
CVE-2020-36196
RESERVED
CVE-2020-36195 (An SQL injection vulnerability has been reported to affect QNAP NAS ru ...)
@@ -22222,10 +22840,9 @@ CVE-2021-3030
RESERVED
CVE-2021-23234
RESERVED
-CVE-2021-23135
- RESERVED
-CVE-2021-23134 [net/nfc: fix use-after-free llcp_sock_bind/connect]
- RESERVED
+CVE-2021-23135 (Exposure of System Data to an Unauthorized Control Sphere vulnerabilit ...)
+ TODO: check
+CVE-2021-23134 (Use After Free vulnerability in nfc sockets in the Linux Kernel before ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6
NOTE: https://www.openwall.com/lists/oss-security/2021/05/11/4
@@ -24435,8 +25052,8 @@ CVE-2021-22157 (Proofpoint Insider Threat Management Server (formerly ObserveIT
NOT-FOR-US: Proofpoint Insider Threat Management Server
CVE-2021-22156
RESERVED
-CVE-2021-22155
- RESERVED
+CVE-2021-22155 (An Authentication Bypass vulnerability in the SAML Authentication comp ...)
+ TODO: check
CVE-2021-22154
RESERVED
CVE-2021-22153
@@ -36194,8 +36811,8 @@ CVE-2020-28724 (Open redirect vulnerability in werkzeug before 0.11.6 via a doub
NOTE: https://github.com/pallets/werkzeug/pull/890
CVE-2020-28723 (Memory leak in IPv6Param::setAddress in CloudAvid PParam 1.3.1. ...)
NOT-FOR-US: CloudAvid
-CVE-2020-28722
- RESERVED
+CVE-2020-28722 (Deskpro Cloud Platform and on-premise 2020.2.3.48207 from 2020-07-30 c ...)
+ TODO: check
CVE-2020-28721
RESERVED
CVE-2020-28720
@@ -62788,6 +63405,7 @@ CVE-2020-18034
CVE-2020-18033
RESERVED
CVE-2020-18032 (Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f ...)
+ {DSA-4914-1}
- graphviz 2.42.2-5 (bug #988000)
NOTE: https://gitlab.com/graphviz/graphviz/-/issues/1700
NOTE: https://gitlab.com/graphviz/graphviz/-/commit/784411ca3655c80da0f6025ab20634b2a6ff696b
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f212ddafa7c5c9cee82443b833f24c91f48b3474
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f212ddafa7c5c9cee82443b833f24c91f48b3474
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210513/d1bc00e6/attachment.htm>
More information about the debian-security-tracker-commits
mailing list