[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Jan 11 08:10:24 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
8ea9d966 by security tracker role at 2022-01-11T08:10:16+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,251 @@
+CVE-2022-23101
+	RESERVED
+CVE-2022-23100
+	RESERVED
+CVE-2022-23099
+	RESERVED
+CVE-2022-23098
+	RESERVED
+CVE-2022-23097
+	RESERVED
+CVE-2022-23096
+	RESERVED
+CVE-2022-23095
+	RESERVED
+CVE-2022-23094
+	RESERVED
+CVE-2022-23093
+	RESERVED
+CVE-2022-23092
+	RESERVED
+CVE-2022-23091
+	RESERVED
+CVE-2022-23090
+	RESERVED
+CVE-2022-23089
+	RESERVED
+CVE-2022-23088
+	RESERVED
+CVE-2022-23087
+	RESERVED
+CVE-2022-23086
+	RESERVED
+CVE-2022-23085
+	RESERVED
+CVE-2022-23084
+	RESERVED
+CVE-2022-23083
+	RESERVED
+CVE-2022-23082
+	RESERVED
+CVE-2022-23081
+	RESERVED
+CVE-2022-23080
+	RESERVED
+CVE-2022-23079
+	RESERVED
+CVE-2022-23078
+	RESERVED
+CVE-2022-23077
+	RESERVED
+CVE-2022-23076
+	RESERVED
+CVE-2022-23075
+	RESERVED
+CVE-2022-23074
+	RESERVED
+CVE-2022-23073
+	RESERVED
+CVE-2022-23072
+	RESERVED
+CVE-2022-23071
+	RESERVED
+CVE-2022-23070
+	RESERVED
+CVE-2022-23069
+	RESERVED
+CVE-2022-23068
+	RESERVED
+CVE-2022-23067
+	RESERVED
+CVE-2022-23066
+	RESERVED
+CVE-2022-23065
+	RESERVED
+CVE-2022-23064
+	RESERVED
+CVE-2022-23063
+	RESERVED
+CVE-2022-23062
+	RESERVED
+CVE-2022-23061
+	RESERVED
+CVE-2022-23060
+	RESERVED
+CVE-2022-23059
+	RESERVED
+CVE-2022-23058
+	RESERVED
+CVE-2022-23057
+	RESERVED
+CVE-2022-23056
+	RESERVED
+CVE-2022-23055
+	RESERVED
+CVE-2022-23054
+	RESERVED
+CVE-2022-23053
+	RESERVED
+CVE-2022-23052
+	RESERVED
+CVE-2022-23051
+	RESERVED
+CVE-2022-23050
+	RESERVED
+CVE-2022-23049
+	RESERVED
+CVE-2022-23048
+	RESERVED
+CVE-2022-23047
+	RESERVED
+CVE-2022-23046
+	RESERVED
+CVE-2022-23045
+	RESERVED
+CVE-2022-23044
+	RESERVED
+CVE-2022-23043
+	RESERVED
+CVE-2022-23042
+	RESERVED
+CVE-2022-23041
+	RESERVED
+CVE-2022-23040
+	RESERVED
+CVE-2022-23039
+	RESERVED
+CVE-2022-23038
+	RESERVED
+CVE-2022-23037
+	RESERVED
+CVE-2022-23036
+	RESERVED
+CVE-2022-23035
+	RESERVED
+CVE-2022-23034
+	RESERVED
+CVE-2022-23033
+	RESERVED
+CVE-2022-23032
+	RESERVED
+CVE-2022-23031
+	RESERVED
+CVE-2022-23030
+	RESERVED
+CVE-2022-23029
+	RESERVED
+CVE-2022-23028
+	RESERVED
+CVE-2022-23027
+	RESERVED
+CVE-2022-23026
+	RESERVED
+CVE-2022-23025
+	RESERVED
+CVE-2022-23024
+	RESERVED
+CVE-2022-23023
+	RESERVED
+CVE-2022-23022
+	RESERVED
+CVE-2022-23021
+	RESERVED
+CVE-2022-23020
+	RESERVED
+CVE-2022-23019
+	RESERVED
+CVE-2022-23018
+	RESERVED
+CVE-2022-23017
+	RESERVED
+CVE-2022-23016
+	RESERVED
+CVE-2022-23015
+	RESERVED
+CVE-2022-23014
+	RESERVED
+CVE-2022-23013
+	RESERVED
+CVE-2022-23012
+	RESERVED
+CVE-2022-23011
+	RESERVED
+CVE-2022-23010
+	RESERVED
+CVE-2022-23009
+	RESERVED
+CVE-2022-23008
+	RESERVED
+CVE-2022-23007
+	RESERVED
+CVE-2022-23006
+	RESERVED
+CVE-2022-23005
+	RESERVED
+CVE-2022-23004
+	RESERVED
+CVE-2022-23003
+	RESERVED
+CVE-2022-23002
+	RESERVED
+CVE-2022-23001
+	RESERVED
+CVE-2022-23000
+	RESERVED
+CVE-2022-22999
+	RESERVED
+CVE-2022-22998
+	RESERVED
+CVE-2022-22997
+	RESERVED
+CVE-2022-22996
+	RESERVED
+CVE-2022-22995
+	RESERVED
+CVE-2022-22994
+	RESERVED
+CVE-2022-22993
+	RESERVED
+CVE-2022-22992
+	RESERVED
+CVE-2022-22991
+	RESERVED
+CVE-2022-22990
+	RESERVED
+CVE-2022-22989
+	RESERVED
+CVE-2022-22988
+	RESERVED
+CVE-2022-21234
+	RESERVED
+CVE-2022-21210
+	RESERVED
+CVE-2022-21145
+	RESERVED
+CVE-2022-0182
+	RESERVED
+CVE-2022-0181
+	RESERVED
+CVE-2022-0180
+	RESERVED
+CVE-2022-0179
+	RESERVED
+CVE-2022-0178
+	RESERVED
+CVE-2022-0177
+	RESERVED
+CVE-2021-4204
+	RESERVED
 CVE-2022-22983
 	RESERVED
 CVE-2022-22982
@@ -642,8 +890,8 @@ CVE-2022-22815 (path_getbbox in path.c in Pillow before 9.0.0 improperly initial
 	NOTE: https://github.com/python-pillow/Pillow/commit/1e092419b6806495c683043ab3feb6ce264f3b9c (9.0.0)
 CVE-2022-22814
 	RESERVED
-CVE-2022-0155
-	RESERVED
+CVE-2022-0155 (follow-redirects is vulnerable to Exposure of Private Personal Informa ...)
+	TODO: check
 CVE-2022-22813
 	RESERVED
 CVE-2022-22812
@@ -854,8 +1102,8 @@ CVE-2022-22732
 	RESERVED
 CVE-2022-22731
 	RESERVED
-CVE-2022-0144
-	RESERVED
+CVE-2022-0144 (shelljs is vulnerable to Improper Privilege Management ...)
+	TODO: check
 CVE-2022-0143
 	RESERVED
 CVE-2022-0142
@@ -9096,20 +9344,20 @@ CVE-2022-21674
 	RESERVED
 CVE-2022-21673
 	RESERVED
-CVE-2022-21672
-	RESERVED
+CVE-2022-21672 (make-ca is a utility to deliver and manage a complete PKI configuratio ...)
+	TODO: check
 CVE-2022-21671
 	RESERVED
-CVE-2022-21670
-	RESERVED
+CVE-2022-21670 (markdown-it is a Markdown parser. Prior to version 1.3.2, special patt ...)
+	TODO: check
 CVE-2022-21669
 	RESERVED
-CVE-2022-21668
-	RESERVED
+CVE-2022-21668 (pipenv is a Python development workflow tool. Starting with version 20 ...)
+	TODO: check
 CVE-2022-21667 (soketi is an open-source WebSockets server. There is an unhandled case ...)
 	NOT-FOR-US: soketi
-CVE-2022-21666
-	RESERVED
+CVE-2022-21666 (Useful Simple Open-Source CMS (USOC) is a content management system (C ...)
+	TODO: check
 CVE-2022-21665
 	RESERVED
 CVE-2022-21664 (WordPress is a free and open-source content management system written  ...)
@@ -19759,6 +20007,7 @@ CVE-2021-40865 (An Unsafe Deserialization vulnerability exists in the worker ser
 CVE-2021-3797 (hestiacp is vulnerable to Use of Wrong Operator in String Comparison ...)
 	NOT-FOR-US: Hestia Control Panel
 CVE-2021-3796 (vim is vulnerable to Use After Free ...)
+	{DLA-2876-1}
 	- vim 2:8.2.3455-1 (bug #994497)
 	[bullseye] - vim 2:8.2.2434-3+deb11u1
 	[buster] - vim <no-dsa> (Minor issue)
@@ -20213,6 +20462,7 @@ CVE-2021-40682
 CVE-2021-3779
 	RESERVED
 CVE-2021-3778 (vim is vulnerable to Heap-based Buffer Overflow ...)
+	{DLA-2876-1}
 	- vim 2:8.2.3455-1 (bug #994498)
 	[bullseye] - vim 2:8.2.2434-3+deb11u1
 	[buster] - vim <no-dsa> (Minor issue)
@@ -30588,22 +30838,22 @@ CVE-2021-36416
 	RESERVED
 CVE-2021-36415
 	RESERVED
-CVE-2021-36414
-	RESERVED
+CVE-2021-36414 (A heab-based buffer overflow vulnerability exists in MP4Box in GPAC 1. ...)
+	TODO: check
 CVE-2021-36413
 	RESERVED
-CVE-2021-36412
-	RESERVED
-CVE-2021-36411
-	RESERVED
-CVE-2021-36410
-	RESERVED
+CVE-2021-36412 (A heap-based buffer overflow vulnerability exists in MP4Box in GPAC 1. ...)
+	TODO: check
+CVE-2021-36411 (An issue has been found in libde265 v1.0.8 due to incorrect access con ...)
+	TODO: check
+CVE-2021-36410 (A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion. ...)
+	TODO: check
 CVE-2021-3641 (Improper Link Resolution Before File Access ('Link Following') vulnera ...)
 	NOT-FOR-US: Bitdefender
-CVE-2021-36409
-	RESERVED
-CVE-2021-36408
-	RESERVED
+CVE-2021-36409 (There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at ...)
+	TODO: check
+CVE-2021-36408 (An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-f ...)
+	TODO: check
 CVE-2021-36407
 	RESERVED
 CVE-2021-36406
@@ -32974,8 +33224,8 @@ CVE-2021-35454
 	RESERVED
 CVE-2021-35453
 	RESERVED
-CVE-2021-35452
-	RESERVED
+CVE-2021-35452 (An Incorrect Access Control vulnerability exists in libde265 v1.0.8 du ...)
+	TODO: check
 CVE-2021-35451 (In Teradici PCoIP Management Console-Enterprise 20.07.0, an unauthenti ...)
 	NOT-FOR-US: Teradici PCoIP Management Console-Enterprise
 CVE-2021-35450 (A Server Side Template Injection in the Entando Admin Console 6.3.9 an ...)
@@ -48171,8 +48421,8 @@ CVE-2021-29456 (Authelia is an open-source authentication and authorization serv
 	NOT-FOR-US: Authelia
 CVE-2021-29455 (Grassroot Platform is an application to make it faster, cheaper and ea ...)
 	NOT-FOR-US: Grassroot Platform
-CVE-2021-29454
-	RESERVED
+CVE-2021-29454 (Smarty is a template engine for PHP, facilitating the separation of pr ...)
+	TODO: check
 CVE-2021-29453 (matrix-media-repo is an open-source multi-domain media repository for  ...)
 	NOT-FOR-US: matrix-media-repo
 CVE-2021-29452 (a12n-server is an npm package which aims to provide a simple authentic ...)
@@ -68925,8 +69175,8 @@ CVE-2021-21409 (Netty is an open-source, asynchronous event-driven network appli
 	NOTE: Fixed by: https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432
 	NOTE: https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32
 	NOTE: Is a followup to: https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj
-CVE-2021-21408
-	RESERVED
+CVE-2021-21408 (Smarty is a template engine for PHP, facilitating the separation of pr ...)
+	TODO: check
 CVE-2021-21407 (Combodo iTop is an open source, web based IT Service Management tool.  ...)
 	NOT-FOR-US: Combodo iTop
 CVE-2021-21406 (Combodo iTop is an open source, web based IT Service Management tool.  ...)
@@ -89613,8 +89863,8 @@ CVE-2020-25429
 	RESERVED
 CVE-2020-25428
 	RESERVED
-CVE-2020-25427
-	RESERVED
+CVE-2020-25427 (A Null pointer dereference vulnerability exits in MP4Box - GPAC versio ...)
+	TODO: check
 CVE-2020-25426
 	RESERVED
 CVE-2020-25425
@@ -116760,6 +117010,7 @@ CVE-2019-20808 (In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI V
 	[jessie] - qemu <not-affected> (Vulnerable code introduced later)
 	NOTE: https://git.qemu.org/?p=qemu.git;a=commit;h=aab0e2a661b2b6bf7915c0aefe807fb60d6d9d13 (v4.2.0-rc0)
 CVE-2019-20807 (In Vim before 8.1.0881, users can circumvent the rvim restricted mode  ...)
+	{DLA-2876-1}
 	- vim 2:8.1.2136-1
 	[buster] - vim <no-dsa> (Minor issue)
 	[jessie] - vim <no-dsa> (Minor issue)
@@ -263642,7 +263893,7 @@ CVE-2017-17095 (tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attack
 CVE-2017-17088 (The Enterprise version of SyncBreeze 10.2.12 and earlier is affected b ...)
 	NOT-FOR-US: SyncBreeze
 CVE-2017-17087 (fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp f ...)
-	{DLA-1871-1}
+	{DLA-2876-1 DLA-1871-1}
 	- vim 2:8.0.1401-1
 	[wheezy] - vim <no-dsa> (Minor issue)
 	NOTE: https://github.com/vim/vim/commit/5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8 (8.0.1263)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8ea9d96659afc8db8c340e59f90d28a7b6362131

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8ea9d96659afc8db8c340e59f90d28a7b6362131
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220111/6515e384/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list