[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Dec 29 20:10:36 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1621c56a by security tracker role at 2022-12-29T20:10:25+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,147 @@
+CVE-2023-22500
+	RESERVED
+CVE-2023-22499
+	RESERVED
+CVE-2023-22498
+	RESERVED
+CVE-2023-22497
+	RESERVED
+CVE-2023-22496
+	RESERVED
+CVE-2023-22495
+	RESERVED
+CVE-2023-22494
+	RESERVED
+CVE-2023-22493
+	RESERVED
+CVE-2023-22492
+	RESERVED
+CVE-2023-22491
+	RESERVED
+CVE-2023-22490
+	RESERVED
+CVE-2023-22489
+	RESERVED
+CVE-2023-22488
+	RESERVED
+CVE-2023-22487
+	RESERVED
+CVE-2023-22486
+	RESERVED
+CVE-2023-22485
+	RESERVED
+CVE-2023-22484
+	RESERVED
+CVE-2023-22483
+	RESERVED
+CVE-2023-22482
+	RESERVED
+CVE-2023-22481
+	RESERVED
+CVE-2023-22480
+	RESERVED
+CVE-2023-22479
+	RESERVED
+CVE-2023-22478
+	RESERVED
+CVE-2023-22477
+	RESERVED
+CVE-2023-22476
+	RESERVED
+CVE-2023-0027
+	RESERVED
+CVE-2022-4854
+	RESERVED
+CVE-2022-4853
+	RESERVED
+CVE-2022-4852
+	RESERVED
+CVE-2022-4851 (Improper Handling of Values in GitHub repository usememos/memos prior  ...)
+	TODO: check
+CVE-2022-4850 (Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos  ...)
+	TODO: check
+CVE-2022-4849 (Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos  ...)
+	TODO: check
+CVE-2022-4848 (Improper Verification of Source of a Communication Channel in GitHub r ...)
+	TODO: check
+CVE-2022-4847 (Incorrectly Specified Destination in a Communication Channel in GitHub ...)
+	TODO: check
+CVE-2022-4846 (Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos  ...)
+	TODO: check
+CVE-2022-4845 (Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos  ...)
+	TODO: check
+CVE-2022-4844 (Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos  ...)
+	TODO: check
+CVE-2022-4843 (NULL Pointer Dereference in GitHub repository radareorg/radare2 prior  ...)
+	TODO: check
+CVE-2022-4842
+	RESERVED
+CVE-2022-4841 (Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memo ...)
+	TODO: check
+CVE-2022-4840 (Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memo ...)
+	TODO: check
+CVE-2022-4839 (Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memo ...)
+	TODO: check
+CVE-2022-4838
+	RESERVED
+CVE-2022-4837
+	RESERVED
+CVE-2022-4836
+	RESERVED
+CVE-2022-4835
+	RESERVED
+CVE-2022-4834
+	RESERVED
+CVE-2022-4833
+	RESERVED
+CVE-2022-4832
+	RESERVED
+CVE-2022-4831
+	RESERVED
+CVE-2022-4830
+	RESERVED
+CVE-2022-4829
+	RESERVED
+CVE-2022-4828
+	RESERVED
+CVE-2022-4827
+	RESERVED
+CVE-2022-4826
+	RESERVED
+CVE-2022-4825
+	RESERVED
+CVE-2022-4824
+	RESERVED
+CVE-2022-48190
+	RESERVED
+CVE-2022-48189
+	RESERVED
+CVE-2022-48188
+	RESERVED
+CVE-2022-48187
+	RESERVED
+CVE-2022-48186
+	RESERVED
+CVE-2022-48185
+	RESERVED
+CVE-2022-48184
+	RESERVED
+CVE-2022-48183
+	RESERVED
+CVE-2022-48182
+	RESERVED
+CVE-2022-48181
+	RESERVED
+CVE-2022-48180
+	RESERVED
+CVE-2022-48179
+	RESERVED
+CVE-2021-4296 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2021-4295 (A vulnerability classified as problematic was found in ONC code-valida ...)
+	TODO: check
+CVE-2018-25058 (A vulnerability classified as problematic has been found in Twitter-Po ...)
+	TODO: check
 CVE-2023-22475
 	RESERVED
 CVE-2023-22474
@@ -7619,14 +7763,14 @@ CVE-2022-46183
 	RESERVED
 CVE-2022-46182
 	RESERVED
-CVE-2022-46181
-	RESERVED
+CVE-2022-46181 (Gotify server is a simple server for sending and receiving messages in ...)
+	TODO: check
 CVE-2022-46180
 	RESERVED
 CVE-2022-46179 (LiuOS is a small Python project meant to imitate the functions of a re ...)
 	TODO: check
-CVE-2022-46178
-	RESERVED
+CVE-2022-46178 (MeterSphere is a one-stop open source continuous testing platform, cov ...)
+	TODO: check
 CVE-2022-46177
 	RESERVED
 CVE-2022-46176
@@ -11740,7 +11884,8 @@ CVE-2022-44723
 	RESERVED
 CVE-2022-44722
 	RESERVED
-CVE-2022-44721 (CrowdStrike Falcon 6.44.15806 allows an administrative attacker to uni ...)
+CVE-2022-44721
+	REJECTED
 	NOT-FOR-US: CrowdStrike Falcon
 CVE-2022-44720
 	RESERVED
@@ -21901,6 +22046,7 @@ CVE-2022-41976
 CVE-2022-41975 (RealVNC VNC Server before 6.11.0 and VNC Viewer before 6.22.826 on Win ...)
 	NOT-FOR-US: RealVNC
 CVE-2022-41974 (multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to ...)
+	{DLA-3250-1}
 	- multipath-tools 0.9.4-1 (bug #1022742)
 	NOTE: https://www.openwall.com/lists/oss-security/2022/10/24/2
 	NOTE: https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt
@@ -21913,6 +22059,7 @@ CVE-2022-41974 (multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local us
 	NOTE: https://github.com/opensvc/multipath-tools/commit/cb57b930fa690ab79b3904846634681685e3470f (0.9.2)
 	NOTE: https://github.com/opensvc/multipath-tools/commit/994811a29332161ec150f1d9822ff460cfc0f316 (0.9.2)
 CVE-2022-41973 (multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to ...)
+	{DLA-3250-1}
 	- multipath-tools 0.9.4-1 (bug #1022742)
 	NOTE: https://www.openwall.com/lists/oss-security/2022/10/24/2
 	NOTE: https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt
@@ -33387,7 +33534,7 @@ CVE-2022-37618
 	RESERVED
 CVE-2022-37617 (Prototype pollution vulnerability in function resolveShims in resolve- ...)
 	NOT-FOR-US: Node browserify-shim
-CVE-2022-37616 (** DISPUTED ** A prototype pollution vulnerability exists in the funct ...)
+CVE-2022-37616 (A prototype pollution vulnerability exists in the function copy in dom ...)
 	{DLA-3154-1}
 	- node-xmldom 0.8.3-1 (bug #1021618)
 	[bullseye] - node-xmldom 0.5.0-1+deb11u1
@@ -55369,7 +55516,7 @@ CVE-2022-29806 (ZoneMinder before 1.36.13 allows remote code execution via an in
 	NOTE: Only supported for trusted users/behind auth, see README.debian.security
 CVE-2022-29805 (A Java Deserialization vulnerability in the Fishbowl Server in Fishbow ...)
 	NOT-FOR-US: Fishbowl Inventory
-CVE-2022-29804 (In filepath.Clean in path/filepath in Go before 1.17.11 and 1.18.x bef ...)
+CVE-2022-29804 (Incorrect conversion of certain invalid paths to valid, absolute paths ...)
 	- golang-1.18 <not-affected> (Only affects Go on Windows)
 	- golang-1.17 <not-affected> (Only affects Go on Windows)
 	- golang-1.15 <not-affected> (Only affects Go on Windows)
@@ -60264,7 +60411,7 @@ CVE-2022-28133 (Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier do
 	NOT-FOR-US: Jenkins plugin
 CVE-2022-28132
 	RESERVED
-CVE-2022-28131 (In Decoder.Skip in encoding/xml in Go before 1.17.12 and 1.18.x before ...)
+CVE-2022-28131 (Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17. ...)
 	- golang-1.18 1.18.4-1
 	- golang-1.15 <removed>
 	- golang-1.11 <removed>
@@ -159843,7 +159990,7 @@ CVE-2020-28367 (Code injection in the go command with cgo before Go 1.14.12 and
 	[stretch] - golang-1.7 <ignored> (validation of cgo flags first introduced in golang-1.8 / CVE-2018-6574)
 	NOTE: https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
 	NOTE: https://github.com/golang/go/issues/42556
-CVE-2020-28366 (Go before 1.14.12 and 1.15.x before 1.15.5 allows Code Injection. ...)
+CVE-2020-28366 (Code injection in the go command with cgo before Go 1.14.12 and Go 1.1 ...)
 	- golang-1.15 1.15.5-1
 	- golang-1.11 <removed>
 	[buster] - golang-1.11 <postponed> (Limited support, minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1621c56a9290d2ca21423f349f3b64737d0ef713

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1621c56a9290d2ca21423f349f3b64737d0ef713
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221229/a46bb284/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list