[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu May 13 09:10:25 BST 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f212ddaf by security tracker role at 2021-05-13T08:10:16+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,619 @@
+CVE-2021-32923
+	RESERVED
+CVE-2021-32922
+	RESERVED
+CVE-2021-32921
+	RESERVED
+CVE-2021-32920
+	RESERVED
+CVE-2021-32919
+	RESERVED
+CVE-2021-32918
+	RESERVED
+CVE-2021-32917
+	RESERVED
+CVE-2021-32916
+	RESERVED
+CVE-2021-32915
+	RESERVED
+CVE-2021-32914
+	RESERVED
+CVE-2021-32913
+	RESERVED
+CVE-2021-32912
+	RESERVED
+CVE-2021-32911
+	RESERVED
+CVE-2021-32910
+	RESERVED
+CVE-2021-32909
+	RESERVED
+CVE-2021-32908
+	RESERVED
+CVE-2021-32907
+	RESERVED
+CVE-2021-32906
+	RESERVED
+CVE-2021-32905
+	RESERVED
+CVE-2021-32904
+	RESERVED
+CVE-2021-32903
+	RESERVED
+CVE-2021-32902
+	RESERVED
+CVE-2021-32901
+	RESERVED
+CVE-2021-32900
+	RESERVED
+CVE-2021-32899
+	RESERVED
+CVE-2021-32898
+	RESERVED
+CVE-2021-32897
+	RESERVED
+CVE-2021-32896
+	RESERVED
+CVE-2021-32895
+	RESERVED
+CVE-2021-32894
+	RESERVED
+CVE-2021-32893
+	RESERVED
+CVE-2021-32892
+	RESERVED
+CVE-2021-32891
+	RESERVED
+CVE-2021-32890
+	RESERVED
+CVE-2021-32889
+	RESERVED
+CVE-2021-32888
+	RESERVED
+CVE-2021-32887
+	RESERVED
+CVE-2021-32886
+	RESERVED
+CVE-2021-32885
+	RESERVED
+CVE-2021-32884
+	RESERVED
+CVE-2021-32883
+	RESERVED
+CVE-2021-32882
+	RESERVED
+CVE-2021-32881
+	RESERVED
+CVE-2021-32880
+	RESERVED
+CVE-2021-32879
+	RESERVED
+CVE-2021-32878
+	RESERVED
+CVE-2021-32877
+	RESERVED
+CVE-2021-32876
+	RESERVED
+CVE-2021-32875
+	RESERVED
+CVE-2021-32874
+	RESERVED
+CVE-2021-32873
+	RESERVED
+CVE-2021-32872
+	RESERVED
+CVE-2021-32871
+	RESERVED
+CVE-2021-32870
+	RESERVED
+CVE-2021-32869
+	RESERVED
+CVE-2021-32868
+	RESERVED
+CVE-2021-32867
+	RESERVED
+CVE-2021-32866
+	RESERVED
+CVE-2021-32865
+	RESERVED
+CVE-2021-32864
+	RESERVED
+CVE-2021-32863
+	RESERVED
+CVE-2021-32862
+	RESERVED
+CVE-2021-32861
+	RESERVED
+CVE-2021-32860
+	RESERVED
+CVE-2021-32859
+	RESERVED
+CVE-2021-32858
+	RESERVED
+CVE-2021-32857
+	RESERVED
+CVE-2021-32856
+	RESERVED
+CVE-2021-32855
+	RESERVED
+CVE-2021-32854
+	RESERVED
+CVE-2021-32853
+	RESERVED
+CVE-2021-32852
+	RESERVED
+CVE-2021-32851
+	RESERVED
+CVE-2021-32850
+	RESERVED
+CVE-2021-32849
+	RESERVED
+CVE-2021-32848
+	RESERVED
+CVE-2021-32847
+	RESERVED
+CVE-2021-32846
+	RESERVED
+CVE-2021-32845
+	RESERVED
+CVE-2021-32844
+	RESERVED
+CVE-2021-32843
+	RESERVED
+CVE-2021-32842
+	RESERVED
+CVE-2021-32841
+	RESERVED
+CVE-2021-32840
+	RESERVED
+CVE-2021-32839
+	RESERVED
+CVE-2021-32838
+	RESERVED
+CVE-2021-32837
+	RESERVED
+CVE-2021-32836
+	RESERVED
+CVE-2021-32835
+	RESERVED
+CVE-2021-32834
+	RESERVED
+CVE-2021-32833
+	RESERVED
+CVE-2021-32832
+	RESERVED
+CVE-2021-32831
+	RESERVED
+CVE-2021-32830
+	RESERVED
+CVE-2021-32829
+	RESERVED
+CVE-2021-32828
+	RESERVED
+CVE-2021-32827
+	RESERVED
+CVE-2021-32826
+	RESERVED
+CVE-2021-32825
+	RESERVED
+CVE-2021-32824
+	RESERVED
+CVE-2021-32823
+	RESERVED
+CVE-2021-32822
+	RESERVED
+CVE-2021-32821
+	RESERVED
+CVE-2021-32820
+	RESERVED
+CVE-2021-32819
+	RESERVED
+CVE-2021-32818
+	RESERVED
+CVE-2021-32817
+	RESERVED
+CVE-2021-32816
+	RESERVED
+CVE-2021-32815
+	RESERVED
+CVE-2021-32814
+	RESERVED
+CVE-2021-32813
+	RESERVED
+CVE-2021-32812
+	RESERVED
+CVE-2021-32811
+	RESERVED
+CVE-2021-32810
+	RESERVED
+CVE-2021-32809
+	RESERVED
+CVE-2021-32808
+	RESERVED
+CVE-2021-32807
+	RESERVED
+CVE-2021-32806
+	RESERVED
+CVE-2021-32805
+	RESERVED
+CVE-2021-32804
+	RESERVED
+CVE-2021-32803
+	RESERVED
+CVE-2021-32802
+	RESERVED
+CVE-2021-32801
+	RESERVED
+CVE-2021-32800
+	RESERVED
+CVE-2021-32799
+	RESERVED
+CVE-2021-32798
+	RESERVED
+CVE-2021-32797
+	RESERVED
+CVE-2021-32796
+	RESERVED
+CVE-2021-32795
+	RESERVED
+CVE-2021-32794
+	RESERVED
+CVE-2021-32793
+	RESERVED
+CVE-2021-32792
+	RESERVED
+CVE-2021-32791
+	RESERVED
+CVE-2021-32790
+	RESERVED
+CVE-2021-32789
+	RESERVED
+CVE-2021-32788
+	RESERVED
+CVE-2021-32787
+	RESERVED
+CVE-2021-32786
+	RESERVED
+CVE-2021-32785
+	RESERVED
+CVE-2021-32784
+	RESERVED
+CVE-2021-32783
+	RESERVED
+CVE-2021-32782
+	RESERVED
+CVE-2021-32781
+	RESERVED
+CVE-2021-32780
+	RESERVED
+CVE-2021-32779
+	RESERVED
+CVE-2021-32778
+	RESERVED
+CVE-2021-32777
+	RESERVED
+CVE-2021-32776
+	RESERVED
+CVE-2021-32775
+	RESERVED
+CVE-2021-32774
+	RESERVED
+CVE-2021-32773
+	RESERVED
+CVE-2021-32772
+	RESERVED
+CVE-2021-32771
+	RESERVED
+CVE-2021-32770
+	RESERVED
+CVE-2021-32769
+	RESERVED
+CVE-2021-32768
+	RESERVED
+CVE-2021-32767
+	RESERVED
+CVE-2021-32766
+	RESERVED
+CVE-2021-32765
+	RESERVED
+CVE-2021-32764
+	RESERVED
+CVE-2021-32763
+	RESERVED
+CVE-2021-32762
+	RESERVED
+CVE-2021-32761
+	RESERVED
+CVE-2021-32760
+	RESERVED
+CVE-2021-32759
+	RESERVED
+CVE-2021-32758
+	RESERVED
+CVE-2021-32757
+	RESERVED
+CVE-2021-32756
+	RESERVED
+CVE-2021-32755
+	RESERVED
+CVE-2021-32754
+	RESERVED
+CVE-2021-32753
+	RESERVED
+CVE-2021-32752
+	RESERVED
+CVE-2021-32751
+	RESERVED
+CVE-2021-32750
+	RESERVED
+CVE-2021-32749
+	RESERVED
+CVE-2021-32748
+	RESERVED
+CVE-2021-32747
+	RESERVED
+CVE-2021-32746
+	RESERVED
+CVE-2021-32745
+	RESERVED
+CVE-2021-32744
+	RESERVED
+CVE-2021-32743
+	RESERVED
+CVE-2021-32742
+	RESERVED
+CVE-2021-32741
+	RESERVED
+CVE-2021-32740
+	RESERVED
+CVE-2021-32739
+	RESERVED
+CVE-2021-32738
+	RESERVED
+CVE-2021-32737
+	RESERVED
+CVE-2021-32736
+	RESERVED
+CVE-2021-32735
+	RESERVED
+CVE-2021-32734
+	RESERVED
+CVE-2021-32733
+	RESERVED
+CVE-2021-32732
+	RESERVED
+CVE-2021-32731
+	RESERVED
+CVE-2021-32730
+	RESERVED
+CVE-2021-32729
+	RESERVED
+CVE-2021-32728
+	RESERVED
+CVE-2021-32727
+	RESERVED
+CVE-2021-32726
+	RESERVED
+CVE-2021-32725
+	RESERVED
+CVE-2021-32724
+	RESERVED
+CVE-2021-32723
+	RESERVED
+CVE-2021-32722
+	RESERVED
+CVE-2021-32721
+	RESERVED
+CVE-2021-32720
+	RESERVED
+CVE-2021-32719
+	RESERVED
+CVE-2021-32718
+	RESERVED
+CVE-2021-32717
+	RESERVED
+CVE-2021-32716
+	RESERVED
+CVE-2021-32715
+	RESERVED
+CVE-2021-32714
+	RESERVED
+CVE-2021-32713
+	RESERVED
+CVE-2021-32712
+	RESERVED
+CVE-2021-32711
+	RESERVED
+CVE-2021-32710
+	RESERVED
+CVE-2021-32709
+	RESERVED
+CVE-2021-32708
+	RESERVED
+CVE-2021-32707
+	RESERVED
+CVE-2021-32706
+	RESERVED
+CVE-2021-32705
+	RESERVED
+CVE-2021-32704
+	RESERVED
+CVE-2021-32703
+	RESERVED
+CVE-2021-32702
+	RESERVED
+CVE-2021-32701
+	RESERVED
+CVE-2021-32700
+	RESERVED
+CVE-2021-32699
+	RESERVED
+CVE-2021-32698
+	RESERVED
+CVE-2021-32697
+	RESERVED
+CVE-2021-32696
+	RESERVED
+CVE-2021-32695
+	RESERVED
+CVE-2021-32694
+	RESERVED
+CVE-2021-32693
+	RESERVED
+CVE-2021-32692
+	RESERVED
+CVE-2021-32691
+	RESERVED
+CVE-2021-32690
+	RESERVED
+CVE-2021-32689
+	RESERVED
+CVE-2021-32688
+	RESERVED
+CVE-2021-32687
+	RESERVED
+CVE-2021-32686
+	RESERVED
+CVE-2021-32685
+	RESERVED
+CVE-2021-32684
+	RESERVED
+CVE-2021-32683
+	RESERVED
+CVE-2021-32682
+	RESERVED
+CVE-2021-32681
+	RESERVED
+CVE-2021-32680
+	RESERVED
+CVE-2021-32679
+	RESERVED
+CVE-2021-32678
+	RESERVED
+CVE-2021-32677
+	RESERVED
+CVE-2021-32676
+	RESERVED
+CVE-2021-32675
+	RESERVED
+CVE-2021-32674
+	RESERVED
+CVE-2021-32673
+	RESERVED
+CVE-2021-32672
+	RESERVED
+CVE-2021-32671
+	RESERVED
+CVE-2021-32670
+	RESERVED
+CVE-2021-32669
+	RESERVED
+CVE-2021-32668
+	RESERVED
+CVE-2021-32667
+	RESERVED
+CVE-2021-32666
+	RESERVED
+CVE-2021-32665
+	RESERVED
+CVE-2021-32664
+	RESERVED
+CVE-2021-32663
+	RESERVED
+CVE-2021-32662
+	RESERVED
+CVE-2021-32661
+	RESERVED
+CVE-2021-32660
+	RESERVED
+CVE-2021-32659
+	RESERVED
+CVE-2021-32658
+	RESERVED
+CVE-2021-32657
+	RESERVED
+CVE-2021-32656
+	RESERVED
+CVE-2021-32655
+	RESERVED
+CVE-2021-32654
+	RESERVED
+CVE-2021-32653
+	RESERVED
+CVE-2021-32652
+	RESERVED
+CVE-2021-32651
+	RESERVED
+CVE-2021-32650
+	RESERVED
+CVE-2021-32649
+	RESERVED
+CVE-2021-32648
+	RESERVED
+CVE-2021-32647
+	RESERVED
+CVE-2021-32646
+	RESERVED
+CVE-2021-32645
+	RESERVED
+CVE-2021-32644
+	RESERVED
+CVE-2021-32643
+	RESERVED
+CVE-2021-32642
+	RESERVED
+CVE-2021-32641
+	RESERVED
+CVE-2021-32640
+	RESERVED
+CVE-2021-32639
+	RESERVED
+CVE-2021-32638
+	RESERVED
+CVE-2021-32637
+	RESERVED
+CVE-2021-32636
+	RESERVED
+CVE-2021-32635
+	RESERVED
+CVE-2021-32634
+	RESERVED
+CVE-2021-32633
+	RESERVED
+CVE-2021-32632
+	RESERVED
+CVE-2021-32631
+	RESERVED
+CVE-2021-32630
+	RESERVED
+CVE-2021-32629
+	RESERVED
+CVE-2021-32628
+	RESERVED
+CVE-2021-32627
+	RESERVED
+CVE-2021-32626
+	RESERVED
+CVE-2021-32625
+	RESERVED
+CVE-2021-32624
+	RESERVED
+CVE-2021-32623
+	RESERVED
+CVE-2021-32622
+	RESERVED
+CVE-2021-32621
+	RESERVED
+CVE-2021-32620
+	RESERVED
+CVE-2021-32619
+	RESERVED
+CVE-2021-32618
+	RESERVED
+CVE-2021-32617
+	RESERVED
+CVE-2021-32616
+	RESERVED
 CVE-2021-3549
 	RESERVED
 CVE-2021-32615
@@ -1336,10 +1952,13 @@ CVE-2021-32030 (The administrator application on ASUS GT-AC2900 devices before 3
 	NOT-FOR-US: ASUS
 CVE-2021-32029
 	RESERVED
+	{DSA-4915-1}
 CVE-2021-32028
 	RESERVED
+	{DSA-4915-1}
 CVE-2021-32027
 	RESERVED
+	{DSA-4915-1}
 CVE-2018-25014 [heap-based buffer overflow in ReadSymbol()]
 	RESERVED
 	- libwebp <unfixed>
@@ -3290,8 +3909,7 @@ CVE-2021-31217
 	RESERVED
 CVE-2021-31216
 	RESERVED
-CVE-2021-31215
-	RESERVED
+CVE-2021-31215 (SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11. ...)
 	- slurm-wlm <unfixed> (bug #988439)
 	- slurm-llnl <removed>
 	NOTE: https://github.com/SchedMD/slurm/commit/a9e9e2fedbd200ca545ab67dd753bd52c919f236 (2.11.7)
@@ -8932,8 +9550,8 @@ CVE-2021-28801
 	RESERVED
 CVE-2021-28800
 	RESERVED
-CVE-2021-28799
-	RESERVED
+CVE-2021-28799 (An improper authorization vulnerability has been reported to affect QN ...)
+	TODO: check
 CVE-2021-28798
 	RESERVED
 CVE-2021-28797 (A stack-based buffer overflow vulnerability has been reported to affec ...)
@@ -17286,10 +17904,10 @@ CVE-2021-25331 (Improper access control in Samsung Pay mini application prior to
 	NOT-FOR-US: Samsung Pay mini application
 CVE-2021-25330 (Calling of non-existent provider in MobileWips application prior to SM ...)
 	NOT-FOR-US: MobileWips application
-CVE-2020-36198
-	RESERVED
-CVE-2020-36197
-	RESERVED
+CVE-2020-36198 (A command injection vulnerability has been reported to affect certain  ...)
+	TODO: check
+CVE-2020-36197 (An improper access control vulnerability has been reported to affect e ...)
+	TODO: check
 CVE-2020-36196
 	RESERVED
 CVE-2020-36195 (An SQL injection vulnerability has been reported to affect QNAP NAS ru ...)
@@ -22222,10 +22840,9 @@ CVE-2021-3030
 	RESERVED
 CVE-2021-23234
 	RESERVED
-CVE-2021-23135
-	RESERVED
-CVE-2021-23134 [net/nfc: fix use-after-free llcp_sock_bind/connect]
-	RESERVED
+CVE-2021-23135 (Exposure of System Data to an Unauthorized Control Sphere vulnerabilit ...)
+	TODO: check
+CVE-2021-23134 (Use After Free vulnerability in nfc sockets in the Linux Kernel before ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6
 	NOTE: https://www.openwall.com/lists/oss-security/2021/05/11/4
@@ -24435,8 +25052,8 @@ CVE-2021-22157 (Proofpoint Insider Threat Management Server (formerly ObserveIT
 	NOT-FOR-US: Proofpoint Insider Threat Management Server
 CVE-2021-22156
 	RESERVED
-CVE-2021-22155
-	RESERVED
+CVE-2021-22155 (An Authentication Bypass vulnerability in the SAML Authentication comp ...)
+	TODO: check
 CVE-2021-22154
 	RESERVED
 CVE-2021-22153
@@ -36194,8 +36811,8 @@ CVE-2020-28724 (Open redirect vulnerability in werkzeug before 0.11.6 via a doub
 	NOTE: https://github.com/pallets/werkzeug/pull/890
 CVE-2020-28723 (Memory leak in IPv6Param::setAddress in CloudAvid PParam 1.3.1. ...)
 	NOT-FOR-US: CloudAvid
-CVE-2020-28722
-	RESERVED
+CVE-2020-28722 (Deskpro Cloud Platform and on-premise 2020.2.3.48207 from 2020-07-30 c ...)
+	TODO: check
 CVE-2020-28721
 	RESERVED
 CVE-2020-28720
@@ -62788,6 +63405,7 @@ CVE-2020-18034
 CVE-2020-18033
 	RESERVED
 CVE-2020-18032 (Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f ...)
+	{DSA-4914-1}
 	- graphviz 2.42.2-5 (bug #988000)
 	NOTE: https://gitlab.com/graphviz/graphviz/-/issues/1700
 	NOTE: https://gitlab.com/graphviz/graphviz/-/commit/784411ca3655c80da0f6025ab20634b2a6ff696b



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f212ddafa7c5c9cee82443b833f24c91f48b3474

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f212ddafa7c5c9cee82443b833f24c91f48b3474
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210513/d1bc00e6/attachment.htm>


More information about the debian-security-tracker-commits mailing list