[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Jan 12 08:10:22 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ba14b454 by security tracker role at 2022-01-12T08:10:14+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,119 @@
+CVE-2022-23178
+	RESERVED
+CVE-2022-23177
+	RESERVED
+CVE-2022-23176
+	RESERVED
+CVE-2022-23175
+	RESERVED
+CVE-2022-23174
+	RESERVED
+CVE-2022-23173
+	RESERVED
+CVE-2022-23172
+	RESERVED
+CVE-2022-23171
+	RESERVED
+CVE-2022-23170
+	RESERVED
+CVE-2022-23169
+	RESERVED
+CVE-2022-23168
+	RESERVED
+CVE-2022-23167
+	RESERVED
+CVE-2022-23166
+	RESERVED
+CVE-2022-23165
+	RESERVED
+CVE-2022-23164
+	RESERVED
+CVE-2022-23163
+	RESERVED
+CVE-2022-23162
+	RESERVED
+CVE-2022-23161
+	RESERVED
+CVE-2022-23160
+	RESERVED
+CVE-2022-23159
+	RESERVED
+CVE-2022-23158
+	RESERVED
+CVE-2022-23157
+	RESERVED
+CVE-2022-23156
+	RESERVED
+CVE-2022-23155
+	RESERVED
+CVE-2022-23154
+	RESERVED
+CVE-2022-23153
+	RESERVED
+CVE-2022-23152
+	RESERVED
+CVE-2022-23151
+	RESERVED
+CVE-2022-23150
+	RESERVED
+CVE-2022-23149
+	RESERVED
+CVE-2022-23148
+	RESERVED
+CVE-2022-23147
+	RESERVED
+CVE-2022-23146
+	RESERVED
+CVE-2022-23145
+	RESERVED
+CVE-2022-23144
+	RESERVED
+CVE-2022-23143
+	RESERVED
+CVE-2022-23142
+	RESERVED
+CVE-2022-23141
+	RESERVED
+CVE-2022-23140
+	RESERVED
+CVE-2022-23139
+	RESERVED
+CVE-2022-23138
+	RESERVED
+CVE-2022-23137
+	RESERVED
+CVE-2022-23136
+	RESERVED
+CVE-2022-23135
+	RESERVED
+CVE-2022-23134
+	RESERVED
+CVE-2022-23133
+	RESERVED
+CVE-2022-23132
+	RESERVED
+CVE-2022-23131
+	RESERVED
+CVE-2022-23130
+	RESERVED
+CVE-2022-23129
+	RESERVED
+CVE-2022-23128
+	RESERVED
+CVE-2022-23127
+	RESERVED
+CVE-2022-23126
+	RESERVED
+CVE-2022-0198
+	RESERVED
+CVE-2022-0197
+	RESERVED
+CVE-2022-0196
+	RESERVED
+CVE-2022-0195
+	RESERVED
+CVE-2021-46283 (nf_tables_newset in net/netfilter/nf_tables_api.c in the Linux kernel  ...)
+	TODO: check
 CVE-2022-23125
 	RESERVED
 CVE-2022-23124
@@ -314,8 +430,8 @@ CVE-2022-0181
 	RESERVED
 CVE-2022-0180
 	RESERVED
-CVE-2022-0179
-	RESERVED
+CVE-2022-0179 (snipe-it is vulnerable to Improper Access Control ...)
+	TODO: check
 CVE-2022-0178
 	RESERVED
 CVE-2022-0177
@@ -856,8 +972,8 @@ CVE-2021-23218 (When running with FIPS mode enabled, Mirantis Container Runtime
 	TODO: check
 CVE-2021-23154 (In Lens prior to 5.3.4, custom helm chart configuration creates helm c ...)
 	NOT-FOR-US: Lens
-CVE-2022-0159
-	RESERVED
+CVE-2022-0159 (orchardcore is vulnerable to Improper Neutralization of Input During W ...)
+	TODO: check
 CVE-2022-0158 (vim is vulnerable to Heap-based Buffer Overflow ...)
 	- vim <unfixed>
 	[bullseye] - vim <no-dsa> (Minor issue)
@@ -2369,8 +2485,8 @@ CVE-2022-22308
 	RESERVED
 CVE-2022-22307
 	RESERVED
-CVE-2022-0087
-	RESERVED
+CVE-2022-0087 (keystone is vulnerable to Improper Neutralization of Input During Web  ...)
+	TODO: check
 CVE-2021-46130
 	RESERVED
 CVE-2022-22306
@@ -5493,10 +5609,10 @@ CVE-2022-21972
 	RESERVED
 CVE-2022-21971
 	RESERVED
-CVE-2022-21970
-	RESERVED
-CVE-2022-21969
-	RESERVED
+CVE-2022-21970 (Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability.  ...)
+	TODO: check
+CVE-2022-21969 (Microsoft Exchange Server Remote Code Execution Vulnerability. This CV ...)
+	TODO: check
 CVE-2022-21968
 	RESERVED
 CVE-2022-21967
@@ -5505,28 +5621,28 @@ CVE-2022-21966
 	RESERVED
 CVE-2022-21965
 	RESERVED
-CVE-2022-21964
-	RESERVED
-CVE-2022-21963
-	RESERVED
-CVE-2022-21962
-	RESERVED
-CVE-2022-21961
-	RESERVED
-CVE-2022-21960
-	RESERVED
-CVE-2022-21959
-	RESERVED
-CVE-2022-21958
-	RESERVED
+CVE-2022-21964 (Remote Desktop Licensing Diagnoser Information Disclosure Vulnerabilit ...)
+	TODO: check
+CVE-2022-21963 (Windows Resilient File System (ReFS) Remote Code Execution Vulnerabili ...)
+	TODO: check
+CVE-2022-21962 (Windows Resilient File System (ReFS) Remote Code Execution Vulnerabili ...)
+	TODO: check
+CVE-2022-21961 (Windows Resilient File System (ReFS) Remote Code Execution Vulnerabili ...)
+	TODO: check
+CVE-2022-21960 (Windows Resilient File System (ReFS) Remote Code Execution Vulnerabili ...)
+	TODO: check
+CVE-2022-21959 (Windows Resilient File System (ReFS) Remote Code Execution Vulnerabili ...)
+	TODO: check
+CVE-2022-21958 (Windows Resilient File System (ReFS) Remote Code Execution Vulnerabili ...)
+	TODO: check
 CVE-2022-21957
 	RESERVED
 CVE-2022-21956
 	RESERVED
 CVE-2022-21955
 	RESERVED
-CVE-2022-21954
-	RESERVED
+CVE-2022-21954 (Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability.  ...)
+	TODO: check
 CVE-2021-45233
 	RESERVED
 CVE-2021-45232 (In Apache APISIX Dashboard before 2.10.1, the Manager API uses two fra ...)
@@ -6094,206 +6210,206 @@ CVE-2021-23228 (DIAEnergie Version 1.7.5 and prior is vulnerable to a reflected
 	NOT-FOR-US: DIAEnergie
 CVE-2022-21933
 	RESERVED
-CVE-2022-21932
-	RESERVED
-CVE-2022-21931
-	RESERVED
-CVE-2022-21930
-	RESERVED
-CVE-2022-21929
-	RESERVED
-CVE-2022-21928
-	RESERVED
+CVE-2022-21932 (Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulner ...)
+	TODO: check
+CVE-2022-21931 (Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. T ...)
+	TODO: check
+CVE-2022-21930 (Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. T ...)
+	TODO: check
+CVE-2022-21929 (Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. T ...)
+	TODO: check
+CVE-2022-21928 (Windows Resilient File System (ReFS) Remote Code Execution Vulnerabili ...)
+	TODO: check
 CVE-2022-21927
 	RESERVED
 CVE-2022-21926
 	RESERVED
-CVE-2022-21925
-	RESERVED
-CVE-2022-21924
-	RESERVED
+CVE-2022-21925 (Windows BackupKey Remote Protocol Security Feature Bypass Vulnerabilit ...)
+	TODO: check
+CVE-2022-21924 (Workstation Service Remote Protocol Security Feature Bypass Vulnerabil ...)
+	TODO: check
 CVE-2022-21923
 	RESERVED
-CVE-2022-21922
-	RESERVED
-CVE-2022-21921
-	RESERVED
-CVE-2022-21920
-	RESERVED
-CVE-2022-21919
-	RESERVED
-CVE-2022-21918
-	RESERVED
-CVE-2022-21917
-	RESERVED
-CVE-2022-21916
-	RESERVED
-CVE-2022-21915
-	RESERVED
-CVE-2022-21914
-	RESERVED
-CVE-2022-21913
-	RESERVED
-CVE-2022-21912
-	RESERVED
-CVE-2022-21911
-	RESERVED
-CVE-2022-21910
-	RESERVED
+CVE-2022-21922 (Remote Procedure Call Runtime Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21921 (Windows Defender Credential Guard Security Feature Bypass Vulnerabilit ...)
+	TODO: check
+CVE-2022-21920 (Windows Kerberos Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21919 (Windows User Profile Service Elevation of Privilege Vulnerability. Thi ...)
+	TODO: check
+CVE-2022-21918 (DirectX Graphics Kernel File Denial of Service Vulnerability. ...)
+	TODO: check
+CVE-2022-21917 (HEVC Video Extensions Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21916 (Windows Common Log File System Driver Elevation of Privilege Vulnerabi ...)
+	TODO: check
+CVE-2022-21915 (Windows GDI+ Information Disclosure Vulnerability. This CVE ID is uniq ...)
+	TODO: check
+CVE-2022-21914 (Windows Remote Access Connection Manager Elevation of Privilege Vulner ...)
+	TODO: check
+CVE-2022-21913 (Local Security Authority (Domain Policy) Remote Protocol Security Feat ...)
+	TODO: check
+CVE-2022-21912 (DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE  ...)
+	TODO: check
+CVE-2022-21911 (.NET Framework Denial of Service Vulnerability. ...)
+	TODO: check
+CVE-2022-21910 (Microsoft Cluster Port Driver Elevation of Privilege Vulnerability. ...)
+	TODO: check
 CVE-2022-21909
 	RESERVED
-CVE-2022-21908
-	RESERVED
-CVE-2022-21907
-	RESERVED
-CVE-2022-21906
-	RESERVED
-CVE-2022-21905
-	RESERVED
-CVE-2022-21904
-	RESERVED
-CVE-2022-21903
-	RESERVED
-CVE-2022-21902
-	RESERVED
-CVE-2022-21901
-	RESERVED
-CVE-2022-21900
-	RESERVED
-CVE-2022-21899
-	RESERVED
-CVE-2022-21898
-	RESERVED
-CVE-2022-21897
-	RESERVED
-CVE-2022-21896
-	RESERVED
-CVE-2022-21895
-	RESERVED
-CVE-2022-21894
-	RESERVED
-CVE-2022-21893
-	RESERVED
-CVE-2022-21892
-	RESERVED
-CVE-2022-21891
-	RESERVED
-CVE-2022-21890
-	RESERVED
-CVE-2022-21889
-	RESERVED
-CVE-2022-21888
-	RESERVED
-CVE-2022-21887
-	RESERVED
+CVE-2022-21908 (Windows Installer Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21907 (HTTP Protocol Stack Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21906 (Windows Defender Application Control Security Feature Bypass Vulnerabi ...)
+	TODO: check
+CVE-2022-21905 (Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is  ...)
+	TODO: check
+CVE-2022-21904 (Windows GDI Information Disclosure Vulnerability. ...)
+	TODO: check
+CVE-2022-21903 (Windows GDI Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21902 (Windows DWM Core Library Elevation of Privilege Vulnerability. This CV ...)
+	TODO: check
+CVE-2022-21901 (Windows Hyper-V Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21900 (Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is  ...)
+	TODO: check
+CVE-2022-21899 (Windows Extensible Firmware Interface Security Feature Bypass Vulnerab ...)
+	TODO: check
+CVE-2022-21898 (DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE  ...)
+	TODO: check
+CVE-2022-21897 (Windows Common Log File System Driver Elevation of Privilege Vulnerabi ...)
+	TODO: check
+CVE-2022-21896 (Windows DWM Core Library Elevation of Privilege Vulnerability. This CV ...)
+	TODO: check
+CVE-2022-21895 (Windows User Profile Service Elevation of Privilege Vulnerability. Thi ...)
+	TODO: check
+CVE-2022-21894 (Secure Boot Security Feature Bypass Vulnerability. ...)
+	TODO: check
+CVE-2022-21893 (Remote Desktop Protocol Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21892 (Windows Resilient File System (ReFS) Remote Code Execution Vulnerabili ...)
+	TODO: check
+CVE-2022-21891 (Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability. ...)
+	TODO: check
+CVE-2022-21890 (Windows IKE Extension Denial of Service Vulnerability. This CVE ID is  ...)
+	TODO: check
+CVE-2022-21889 (Windows IKE Extension Denial of Service Vulnerability. This CVE ID is  ...)
+	TODO: check
+CVE-2022-21888 (Windows Modern Execution Server Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21887 (Win32k Elevation of Privilege Vulnerability. This CVE ID is unique fro ...)
+	TODO: check
 CVE-2022-21886
 	RESERVED
-CVE-2022-21885
-	RESERVED
-CVE-2022-21884
-	RESERVED
-CVE-2022-21883
-	RESERVED
-CVE-2022-21882
-	RESERVED
-CVE-2022-21881
-	RESERVED
-CVE-2022-21880
-	RESERVED
-CVE-2022-21879
-	RESERVED
-CVE-2022-21878
-	RESERVED
-CVE-2022-21877
-	RESERVED
-CVE-2022-21876
-	RESERVED
-CVE-2022-21875
-	RESERVED
-CVE-2022-21874
-	RESERVED
-CVE-2022-21873
-	RESERVED
-CVE-2022-21872
-	RESERVED
-CVE-2022-21871
-	RESERVED
-CVE-2022-21870
-	RESERVED
-CVE-2022-21869
-	RESERVED
-CVE-2022-21868
-	RESERVED
-CVE-2022-21867
-	RESERVED
-CVE-2022-21866
-	RESERVED
-CVE-2022-21865
-	RESERVED
-CVE-2022-21864
-	RESERVED
-CVE-2022-21863
-	RESERVED
-CVE-2022-21862
-	RESERVED
-CVE-2022-21861
-	RESERVED
-CVE-2022-21860
-	RESERVED
-CVE-2022-21859
-	RESERVED
-CVE-2022-21858
-	RESERVED
-CVE-2022-21857
-	RESERVED
+CVE-2022-21885 (Windows Remote Access Connection Manager Elevation of Privilege Vulner ...)
+	TODO: check
+CVE-2022-21884 (Local Security Authority Subsystem Service Elevation of Privilege Vuln ...)
+	TODO: check
+CVE-2022-21883 (Windows IKE Extension Denial of Service Vulnerability. This CVE ID is  ...)
+	TODO: check
+CVE-2022-21882 (Win32k Elevation of Privilege Vulnerability. This CVE ID is unique fro ...)
+	TODO: check
+CVE-2022-21881 (Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is un ...)
+	TODO: check
+CVE-2022-21880 (Windows GDI+ Information Disclosure Vulnerability. This CVE ID is uniq ...)
+	TODO: check
+CVE-2022-21879 (Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is un ...)
+	TODO: check
+CVE-2022-21878 (Windows Geolocation Service Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21877 (Storage Spaces Controller Information Disclosure Vulnerability. ...)
+	TODO: check
+CVE-2022-21876 (Win32k Information Disclosure Vulnerability. ...)
+	TODO: check
+CVE-2022-21875 (Windows Storage Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21874 (Windows Security Center API Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21873 (Tile Data Repository Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21872 (Windows Event Tracing Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21871 (Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Priv ...)
+	TODO: check
+CVE-2022-21870 (Tablet Windows User Interface Application Core Elevation of Privilege  ...)
+	TODO: check
+CVE-2022-21869 (Clipboard User Service Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21868 (Windows Devices Human Interface Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21867 (Windows Push Notifications Apps Elevation Of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21866 (Windows System Launcher Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21865 (Connected Devices Platform Service Elevation of Privilege Vulnerabilit ...)
+	TODO: check
+CVE-2022-21864 (Windows UI Immersive Server API Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21863 (Windows StateRepository API Server file Elevation of Privilege Vulnera ...)
+	TODO: check
+CVE-2022-21862 (Windows Application Model Core API Elevation of Privilege Vulnerabilit ...)
+	TODO: check
+CVE-2022-21861 (Task Flow Data Engine Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21860 (Windows AppContracts API Server Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21859 (Windows Accounts Control Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21858 (Windows Bind Filter Driver Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21857 (Active Directory Domain Services Elevation of Privilege Vulnerability. ...)
+	TODO: check
 CVE-2022-21856
 	RESERVED
-CVE-2022-21855
-	RESERVED
+CVE-2022-21855 (Microsoft Exchange Server Remote Code Execution Vulnerability. This CV ...)
+	TODO: check
 CVE-2022-21854
 	RESERVED
 CVE-2022-21853
 	RESERVED
-CVE-2022-21852
-	RESERVED
-CVE-2022-21851
-	RESERVED
-CVE-2022-21850
-	RESERVED
-CVE-2022-21849
-	RESERVED
-CVE-2022-21848
-	RESERVED
-CVE-2022-21847
-	RESERVED
-CVE-2022-21846
-	RESERVED
+CVE-2022-21852 (Windows DWM Core Library Elevation of Privilege Vulnerability. This CV ...)
+	TODO: check
+CVE-2022-21851 (Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID ...)
+	TODO: check
+CVE-2022-21850 (Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID ...)
+	TODO: check
+CVE-2022-21849 (Windows IKE Extension Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21848 (Windows IKE Extension Denial of Service Vulnerability. This CVE ID is  ...)
+	TODO: check
+CVE-2022-21847 (Windows Hyper-V Denial of Service Vulnerability. ...)
+	TODO: check
+CVE-2022-21846 (Microsoft Exchange Server Remote Code Execution Vulnerability. This CV ...)
+	TODO: check
 CVE-2022-21845
 	RESERVED
 CVE-2022-21844
 	RESERVED
-CVE-2022-21843
-	RESERVED
-CVE-2022-21842
-	RESERVED
-CVE-2022-21841
-	RESERVED
-CVE-2022-21840
-	RESERVED
-CVE-2022-21839
-	RESERVED
-CVE-2022-21838
-	RESERVED
-CVE-2022-21837
-	RESERVED
-CVE-2022-21836
-	RESERVED
-CVE-2022-21835
-	RESERVED
-CVE-2022-21834
-	RESERVED
-CVE-2022-21833
-	RESERVED
+CVE-2022-21843 (Windows IKE Extension Denial of Service Vulnerability. This CVE ID is  ...)
+	TODO: check
+CVE-2022-21842 (Microsoft Word Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21841 (Microsoft Excel Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21840 (Microsoft Office Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21839 (Windows Event Tracing Discretionary Access Control List Denial of Serv ...)
+	TODO: check
+CVE-2022-21838 (Windows Cleanup Manager Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21837 (Microsoft SharePoint Server Remote Code Execution Vulnerability. ...)
+	TODO: check
+CVE-2022-21836 (Windows Certificate Spoofing Vulnerability. ...)
+	TODO: check
+CVE-2022-21835 (Microsoft Cryptographic Services Elevation of Privilege Vulnerability. ...)
+	TODO: check
+CVE-2022-21834 (Windows User-mode Driver Framework Reflector Driver Elevation of Privi ...)
+	TODO: check
+CVE-2022-21833 (Virtual Machine IDE Drive Elevation of Privilege Vulnerability. ...)
+	TODO: check
 CVE-2021-45043 (HD-Network Real-time Monitoring System 2.0 allows ../ directory traver ...)
 	NOT-FOR-US: HD-Network Real-time Monitoring System
 CVE-2021-45042 (In HashiCorp Vault and Vault Enterprise before 1.7.7, 1.8.x before 1.8 ...)
@@ -9258,8 +9374,8 @@ CVE-2021-44001 (A vulnerability has been identified in JT2Go (All versions <
 	NOT-FOR-US: Siemens
 CVE-2021-44000
 	RESERVED
-CVE-2021-43999
-	RESERVED
+CVE-2021-43999 (Apache Guacamole 1.2.0 and 1.3.0 do not properly validate responses re ...)
+	TODO: check
 CVE-2021-3976 (kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) ...)
 	NOT-FOR-US: kimai2
 CVE-2021-3975 [segmentation fault during VM shutdown can lead to vdsm hung]
@@ -9332,14 +9448,14 @@ CVE-2021-43975 (In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in
 	- linux 5.15.5-2
 	[bullseye] - linux 5.10.84-1
 	NOTE: https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
-CVE-2021-43974
-	RESERVED
-CVE-2021-43973
-	RESERVED
-CVE-2021-43972
-	RESERVED
-CVE-2021-43971
-	RESERVED
+CVE-2021-43974 (An issue was discovered in SysAid ITIL 20.4.74 b10. The /enduserreg en ...)
+	TODO: check
+CVE-2021-43973 (An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysA ...)
+	TODO: check
+CVE-2021-43972 (An unrestricted file copy vulnerability in /UserSelfServiceSettings.js ...)
+	TODO: check
+CVE-2021-43971 (A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITI ...)
+	TODO: check
 CVE-2021-43970
 	RESERVED
 CVE-2021-43969
@@ -9603,8 +9719,8 @@ CVE-2022-21648 (Latte is an open source template engine for PHP. Versions since
 	NOTE: https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0
 CVE-2022-21647 (CodeIgniter is an open source PHP full-stack web framework. Deserializ ...)
 	- codeigniter <itp> (bug #471583)
-CVE-2022-21646
-	RESERVED
+CVE-2022-21646 (SpiceDB is a database system for managing security-critical applicatio ...)
+	TODO: check
 CVE-2022-21645
 	RESERVED
 CVE-2022-21644 (USOC is an open source CMS with a focus on simplicity. In affected ver ...)
@@ -13410,12 +13526,13 @@ CVE-2021-3918 (json-schema is vulnerable to Improperly Controlled Modification o
 	[buster] - node-json-schema <no-dsa> (Minor issue)
 	NOTE: https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741 (v0.4.0)
 CVE-2021-43174 (NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, suppo ...)
+	{DSA-5041-1}
 	- routinator <itp> (bug #929024)
 	- cfrpki 1.4.0-1
 	NOTE: https://www.nlnetlabs.nl/downloads/routinator/CVE-2021-43172_CVE-2021-43173_CVE-2021-43174.txt
 	NOTE: https://github.com/NLnetLabs/routinator/pull/667
 CVE-2021-43173 (In NLnet Labs Routinator prior to 0.10.2, a validation run can be dela ...)
-	{DSA-5033-1}
+	{DSA-5041-1 DSA-5033-1}
 	- routinator <itp> (bug #929024)
 	- cfrpki 1.4.0-1
 	- fort-validator 1.5.3-1
@@ -13765,28 +13882,32 @@ CVE-2021-43034 (An issue was discovered in Kaseya Unitrends Backup Appliance bef
 CVE-2021-43033 (An issue was discovered in Kaseya Unitrends Backup Appliance before 10 ...)
 	NOT-FOR-US: Kaseya
 CVE-2021-3912 (OctoRPKI tries to load the entire contents of a repository in memory,  ...)
+	{DSA-5041-1}
 	- routinator <itp> (bug #929024)
 	- cfrpki 1.4.0-1
 	NOTE: https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g9wh-3vrx-r7hg
 CVE-2021-3911 (If the ROA that a repository returns contains too many bits for the IP ...)
+	{DSA-5041-1}
 	- cfrpki 1.4.0-1
 	NOTE: https://github.com/cloudflare/cfrpki/security/advisories/GHSA-w6ww-fmfx-2x22
 CVE-2021-3910 (OctoRPKI crashes when encountering a repository that returns an invali ...)
+	{DSA-5041-1}
 	- cfrpki 1.4.0-1
 	NOTE: https://github.com/cloudflare/cfrpki/security/advisories/GHSA-5mxh-2qfv-4g7j
 CVE-2021-3909 (OctoRPKI does not limit the length of a connection, allowing for a slo ...)
-	{DSA-5033-1}
+	{DSA-5041-1 DSA-5033-1}
 	- routinator <itp> (bug #929024)
 	- cfrpki 1.4.0-1
 	- fort-validator 1.5.3-1
 	- rpki-client 7.5-1
 	NOTE: https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8cvr-4rrf-f244
 CVE-2021-3908 (OctoRPKI does not limit the depth of a certificate chain, allowing for ...)
+	{DSA-5041-1}
 	- cfrpki 1.4.0-1
 	- routinator <itp> (bug #929024)
 	NOTE: https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g5gj-9ggf-9vmq
 CVE-2021-3907 (OctoRPKI does not escape a URI with a filename containing "..", this a ...)
-	{DSA-5033-1}
+	{DSA-5041-1 DSA-5033-1}
 	- cfrpki 1.4.0-1
 	- fort-validator 1.5.3-1
 	NOTE: https://github.com/cloudflare/cfrpki/security/advisories/GHSA-cqh2-vc2f-q4fh
@@ -18061,8 +18182,8 @@ CVE-2021-41769 (A vulnerability has been identified in SIPROTEC 5 6MD85 devices
 	NOT-FOR-US: Siemens
 CVE-2021-41768
 	RESERVED
-CVE-2021-41767
-	RESERVED
+CVE-2021-41767 (Apache Guacamole 1.3.0 and older may incorrectly include a private tun ...)
+	TODO: check
 CVE-2021-3837 (openwhyd is vulnerable to Improper Authorization ...)
 	NOT-FOR-US: openwhyd
 CVE-2021-41766
@@ -21442,6 +21563,7 @@ CVE-2021-40355 (A vulnerability has been identified in Teamcenter V12.4 (All ver
 CVE-2021-40354 (A vulnerability has been identified in Teamcenter V12.4 (All versions  ...)
 	NOT-FOR-US: Siemens
 CVE-2021-3761 (Any CA issuer in the RPKI can trick OctoRPKI prior to 1.3.0 into emitt ...)
+	{DSA-5041-1}
 	- cfrpki 1.3.0-1 (bug #994572)
 	NOTE: https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9
 	NOTE: https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422
@@ -22070,7 +22192,7 @@ CVE-2021-40120 (A vulnerability in the web-based management interface of certain
 	NOT-FOR-US: Cisco
 CVE-2021-40119 (A vulnerability in the key-based SSH authentication mechanism of Cisco ...)
 	NOT-FOR-US: Cisco
-CVE-2021-40118 (Multiple vulnerabilities in the web services interface of Cisco Adapti ...)
+CVE-2021-40118 (A vulnerability in the web services interface of Cisco Adaptive Securi ...)
 	NOT-FOR-US: Cisco
 CVE-2021-40117 (A vulnerability in SSL/TLS message handler for Cisco Adaptive Security ...)
 	NOT-FOR-US: Cisco



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ba14b45448c21804984a52f87072b7af8f98dde2

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ba14b45448c21804984a52f87072b7af8f98dde2
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220112/28d84e6d/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list