[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Feb 22 08:10:31 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
2f8c0b6e by security tracker role at 2022-02-22T08:10:23+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,64 @@
-CVE-2022-25636 [netfilter: nf_tables_offload: incorrect flow offload action array size]
+CVE-2022-25643
+	RESERVED
+CVE-2022-25642
+	RESERVED
+CVE-2022-25641
+	RESERVED
+CVE-2022-25640
+	RESERVED
+CVE-2022-25639
+	RESERVED
+CVE-2022-25638
+	RESERVED
+CVE-2022-25637
+	RESERVED
+CVE-2022-25635
+	RESERVED
+CVE-2022-25634
+	RESERVED
+CVE-2022-25633
+	RESERVED
+CVE-2022-25632
+	RESERVED
+CVE-2022-25631
+	RESERVED
+CVE-2022-25630
+	RESERVED
+CVE-2022-25629
+	RESERVED
+CVE-2022-25628
+	RESERVED
+CVE-2022-25627
+	RESERVED
+CVE-2022-25626
+	RESERVED
+CVE-2022-25625
+	RESERVED
+CVE-2022-25624
+	RESERVED
+CVE-2022-25623
+	RESERVED
+CVE-2022-25325
+	RESERVED
+CVE-2022-25234
+	RESERVED
+CVE-2022-25230
+	RESERVED
+CVE-2022-21219
+	RESERVED
+CVE-2022-21124
+	RESERVED
+CVE-2022-0717
+	RESERVED
+CVE-2022-0716
+	RESERVED
+CVE-2022-0715
+	RESERVED
+CVE-2022-0714
+	RESERVED
+CVE-2022-0713
+	RESERVED
+CVE-2022-25636 (net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 a ...)
 	- linux <unfixed>
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	[stretch] - linux <not-affected> (Vulnerable code not present)
@@ -540,8 +600,8 @@ CVE-2022-0698
 	RESERVED
 CVE-2022-0697
 	RESERVED
-CVE-2022-0696
-	RESERVED
+CVE-2022-0696 (NULL Pointer Dereference in Conda vim prior to 8.2. ...)
+	TODO: check
 CVE-2022-0695
 	RESERVED
 CVE-2021-46701 (PreMiD 2.2.0 allows unintended access via the websocket transport. An  ...)
@@ -720,8 +780,8 @@ CVE-2022-25312
 	RESERVED
 CVE-2022-21132
 	RESERVED
-CVE-2022-0676
-	RESERVED
+CVE-2022-0676 (Heap-based Buffer Overflow in NPM radare2.js prior to 5.6.4. ...)
+	TODO: check
 CVE-2022-0675
 	RESERVED
 CVE-2022-25315 (In Expat (aka libexpat) before 2.4.5, there is an integer overflow in  ...)
@@ -2332,8 +2392,7 @@ CVE-2022-23922
 	RESERVED
 CVE-2022-23104
 	RESERVED
-CVE-2022-0563 [partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline]
-	RESERVED
+CVE-2022-0563 (A flaw was found in the util-linux chfn and chsh utilities when compil ...)
 	- util-linux <unfixed> (unimportant)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2053151
 	NOTE: https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
@@ -2785,8 +2844,8 @@ CVE-2022-24566
 	RESERVED
 CVE-2022-24565
 	RESERVED
-CVE-2022-24564
-	RESERVED
+CVE-2022-24564 (Checkmk <=2.0.0p19 contains a Cross Site Scripting (XSS) vulnerabil ...)
+	TODO: check
 CVE-2022-24563
 	RESERVED
 CVE-2022-24562
@@ -10523,8 +10582,8 @@ CVE-2022-22310 (IBM WebSphere Application Server Liberty 21.0.0.10 through 21.0.
 	NOT-FOR-US: IBM
 CVE-2022-22309
 	RESERVED
-CVE-2022-22308
-	RESERVED
+CVE-2022-22308 (IBM Planning Analytics 2.0 is vulnerable to a Remote File Include (RFI ...)
+	TODO: check
 CVE-2022-22307
 	RESERVED
 CVE-2022-0087 (keystone is vulnerable to Improper Neutralization of Input During Web  ...)
@@ -14396,8 +14455,7 @@ CVE-2021-4117 (yetiforcecrm is vulnerable to Business Logic Errors ...)
 	NOT-FOR-US: yetiforcecrm
 CVE-2021-4116 (yetiforcecrm is vulnerable to Improper Neutralization of Input During  ...)
 	NOT-FOR-US: yetiforcecrm
-CVE-2021-4115 [file descriptor leak allows an unprivileged user to cause a crash]
-	RESERVED
+CVE-2021-4115 (There is a flaw in polkit which can allow an unprivileged user to caus ...)
 	[experimental] - policykit-1 0.120-6
 	- policykit-1 0.105-32 (bug #1005784)
 	[bullseye] - policykit-1 <no-dsa> (Minor issue)
@@ -15964,24 +16022,24 @@ CVE-2021-44579
 	RESERVED
 CVE-2021-44578
 	RESERVED
-CVE-2021-44577
-	RESERVED
-CVE-2021-44576
-	RESERVED
-CVE-2021-44575
-	RESERVED
-CVE-2021-44574
-	RESERVED
-CVE-2021-44573
-	RESERVED
+CVE-2021-44577 (Two heap-overflow vulnerabilities exist in openSUSE libsolv through 13 ...)
+	TODO: check
+CVE-2021-44576 (Two memory vulnerabilities exists in openSUSE libsolv through 13 Dec 2 ...)
+	TODO: check
+CVE-2021-44575 (Two heap-overflow vulnerabilities exists in openSUSE libsolv through 1 ...)
+	TODO: check
+CVE-2021-44574 (A heap-overflow vulnerability exists in openSUSE libsolv through 13 De ...)
+	TODO: check
+CVE-2021-44573 (Two heap overflow vulnerabilities exist in oenSUSE libsolv through 13  ...)
+	TODO: check
 CVE-2021-44572
 	RESERVED
-CVE-2021-44571
-	RESERVED
-CVE-2021-44570
-	RESERVED
-CVE-2021-44569
-	RESERVED
+CVE-2021-44571 (A heap overflow vulnerability exisfts in openSUSE libsolv through 13 D ...)
+	TODO: check
+CVE-2021-44570 (Two heap-overflow vulnerabilities exists in openSUSE/libsolv through 1 ...)
+	TODO: check
+CVE-2021-44569 (A heap-buffer openSUSE libsolv through 13 Dec 2020 exists in the solve ...)
+	TODO: check
 CVE-2021-44568 (Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv th ...)
 	- libsolv <unfixed> (unimportant)
 	NOTE: https://github.com/openSUSE/libsolv/issues/425
@@ -37682,9 +37740,9 @@ CVE-2021-37422 (Zoho ManageEngine ADSelfService Plus 6111 and prior is vulnerabl
 	NOT-FOR-US: Zoho ManageEngine
 CVE-2021-37421 (Zoho ManageEngine ADSelfService Plus 6103 and prior is vulnerable to a ...)
 	NOT-FOR-US: Zoho ManageEngine
-CVE-2021-37420 (ManageEngine ADSelfService Plus before 6112 is vulnerable to mail spoo ...)
+CVE-2021-37420 (Zoho ManageEngine ADSelfService Plus before 6112 is vulnerable to mail ...)
 	NOT-FOR-US: ManageEngine
-CVE-2021-37419 (ManageEngine ADSelfService Plus before 6112 is vulnerable to SSRF. ...)
+CVE-2021-37419 (Zoho ManageEngine ADSelfService Plus before 6112 is vulnerable to SSRF ...)
 	NOT-FOR-US: ManageEngine
 CVE-2021-37418
 	REJECTED



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2f8c0b6e305b9e232ca3d1e67957e4d76abcbdf8

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2f8c0b6e305b9e232ca3d1e67957e4d76abcbdf8
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220222/2fa8383d/attachment.htm>


More information about the debian-security-tracker-commits mailing list