[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Jul 16 09:10:21 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
14fba66e by security tracker role at 2022-07-16T08:10:11+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,497 @@
+CVE-2022-36125
+	RESERVED
+CVE-2022-36124
+	RESERVED
+CVE-2022-36123
+	RESERVED
+CVE-2022-36122
+	RESERVED
+CVE-2022-36121
+	RESERVED
+CVE-2022-36120
+	RESERVED
+CVE-2022-36119
+	RESERVED
+CVE-2022-36118
+	RESERVED
+CVE-2022-36117
+	RESERVED
+CVE-2022-36116
+	RESERVED
+CVE-2022-36115
+	RESERVED
+CVE-2022-36114
+	RESERVED
+CVE-2022-36113
+	RESERVED
+CVE-2022-36112
+	RESERVED
+CVE-2022-36111
+	RESERVED
+CVE-2022-36110
+	RESERVED
+CVE-2022-36109
+	RESERVED
+CVE-2022-36108
+	RESERVED
+CVE-2022-36107
+	RESERVED
+CVE-2022-36106
+	RESERVED
+CVE-2022-36105
+	RESERVED
+CVE-2022-36104
+	RESERVED
+CVE-2022-36103
+	RESERVED
+CVE-2022-36102
+	RESERVED
+CVE-2022-36101
+	RESERVED
+CVE-2022-36100
+	RESERVED
+CVE-2022-36099
+	RESERVED
+CVE-2022-36098
+	RESERVED
+CVE-2022-36097
+	RESERVED
+CVE-2022-36096
+	RESERVED
+CVE-2022-36095
+	RESERVED
+CVE-2022-36094
+	RESERVED
+CVE-2022-36093
+	RESERVED
+CVE-2022-36092
+	RESERVED
+CVE-2022-36091
+	RESERVED
+CVE-2022-36090
+	RESERVED
+CVE-2022-36089
+	RESERVED
+CVE-2022-36088
+	RESERVED
+CVE-2022-36087
+	RESERVED
+CVE-2022-36086
+	RESERVED
+CVE-2022-36085
+	RESERVED
+CVE-2022-36084
+	RESERVED
+CVE-2022-36083
+	RESERVED
+CVE-2022-36082
+	RESERVED
+CVE-2022-36081
+	RESERVED
+CVE-2022-36080
+	RESERVED
+CVE-2022-36079
+	RESERVED
+CVE-2022-36078
+	RESERVED
+CVE-2022-36077
+	RESERVED
+CVE-2022-36076
+	RESERVED
+CVE-2022-36075
+	RESERVED
+CVE-2022-36074
+	RESERVED
+CVE-2022-36073
+	RESERVED
+CVE-2022-36072
+	RESERVED
+CVE-2022-36071
+	RESERVED
+CVE-2022-36070
+	RESERVED
+CVE-2022-36069
+	RESERVED
+CVE-2022-36068
+	RESERVED
+CVE-2022-36067
+	RESERVED
+CVE-2022-36066
+	RESERVED
+CVE-2022-36065
+	RESERVED
+CVE-2022-36064
+	RESERVED
+CVE-2022-36063
+	RESERVED
+CVE-2022-36062
+	RESERVED
+CVE-2022-36061
+	RESERVED
+CVE-2022-36060
+	RESERVED
+CVE-2022-36059
+	RESERVED
+CVE-2022-36058
+	RESERVED
+CVE-2022-36057
+	RESERVED
+CVE-2022-36056
+	RESERVED
+CVE-2022-36055
+	RESERVED
+CVE-2022-36054
+	RESERVED
+CVE-2022-36053
+	RESERVED
+CVE-2022-36052
+	RESERVED
+CVE-2022-36051
+	RESERVED
+CVE-2022-36050
+	RESERVED
+CVE-2022-36049
+	RESERVED
+CVE-2022-36048
+	RESERVED
+CVE-2022-36047
+	RESERVED
+CVE-2022-36046
+	RESERVED
+CVE-2022-36045
+	RESERVED
+CVE-2022-36044
+	RESERVED
+CVE-2022-36043
+	RESERVED
+CVE-2022-36042
+	RESERVED
+CVE-2022-36041
+	RESERVED
+CVE-2022-36040
+	RESERVED
+CVE-2022-36039
+	RESERVED
+CVE-2022-36038
+	RESERVED
+CVE-2022-36037
+	RESERVED
+CVE-2022-36036
+	RESERVED
+CVE-2022-36035
+	RESERVED
+CVE-2022-36034
+	RESERVED
+CVE-2022-36033
+	RESERVED
+CVE-2022-36032
+	RESERVED
+CVE-2022-36031
+	RESERVED
+CVE-2022-36030
+	RESERVED
+CVE-2022-36029
+	RESERVED
+CVE-2022-36028
+	RESERVED
+CVE-2022-36027
+	RESERVED
+CVE-2022-36026
+	RESERVED
+CVE-2022-36025
+	RESERVED
+CVE-2022-36024
+	RESERVED
+CVE-2022-36023
+	RESERVED
+CVE-2022-36022
+	RESERVED
+CVE-2022-36021
+	RESERVED
+CVE-2022-36020
+	RESERVED
+CVE-2022-36019
+	RESERVED
+CVE-2022-36018
+	RESERVED
+CVE-2022-36017
+	RESERVED
+CVE-2022-36016
+	RESERVED
+CVE-2022-36015
+	RESERVED
+CVE-2022-36014
+	RESERVED
+CVE-2022-36013
+	RESERVED
+CVE-2022-36012
+	RESERVED
+CVE-2022-36011
+	RESERVED
+CVE-2022-36010
+	RESERVED
+CVE-2022-36009
+	RESERVED
+CVE-2022-36008
+	RESERVED
+CVE-2022-36007
+	RESERVED
+CVE-2022-36006
+	RESERVED
+CVE-2022-36005
+	RESERVED
+CVE-2022-36004
+	RESERVED
+CVE-2022-36003
+	RESERVED
+CVE-2022-36002
+	RESERVED
+CVE-2022-36001
+	RESERVED
+CVE-2022-36000
+	RESERVED
+CVE-2022-35999
+	RESERVED
+CVE-2022-35998
+	RESERVED
+CVE-2022-35997
+	RESERVED
+CVE-2022-35996
+	RESERVED
+CVE-2022-35995
+	RESERVED
+CVE-2022-35994
+	RESERVED
+CVE-2022-35993
+	RESERVED
+CVE-2022-35992
+	RESERVED
+CVE-2022-35991
+	RESERVED
+CVE-2022-35990
+	RESERVED
+CVE-2022-35989
+	RESERVED
+CVE-2022-35988
+	RESERVED
+CVE-2022-35987
+	RESERVED
+CVE-2022-35986
+	RESERVED
+CVE-2022-35985
+	RESERVED
+CVE-2022-35984
+	RESERVED
+CVE-2022-35983
+	RESERVED
+CVE-2022-35982
+	RESERVED
+CVE-2022-35981
+	RESERVED
+CVE-2022-35980
+	RESERVED
+CVE-2022-35979
+	RESERVED
+CVE-2022-35978
+	RESERVED
+CVE-2022-35977
+	RESERVED
+CVE-2022-35976
+	RESERVED
+CVE-2022-35975
+	RESERVED
+CVE-2022-35974
+	RESERVED
+CVE-2022-35973
+	RESERVED
+CVE-2022-35972
+	RESERVED
+CVE-2022-35971
+	RESERVED
+CVE-2022-35970
+	RESERVED
+CVE-2022-35969
+	RESERVED
+CVE-2022-35968
+	RESERVED
+CVE-2022-35967
+	RESERVED
+CVE-2022-35966
+	RESERVED
+CVE-2022-35965
+	RESERVED
+CVE-2022-35964
+	RESERVED
+CVE-2022-35963
+	RESERVED
+CVE-2022-35962
+	RESERVED
+CVE-2022-35961
+	RESERVED
+CVE-2022-35960
+	RESERVED
+CVE-2022-35959
+	RESERVED
+CVE-2022-35958
+	RESERVED
+CVE-2022-35957
+	RESERVED
+CVE-2022-35956
+	RESERVED
+CVE-2022-35955
+	RESERVED
+CVE-2022-35954
+	RESERVED
+CVE-2022-35953
+	RESERVED
+CVE-2022-35952
+	RESERVED
+CVE-2022-35951
+	RESERVED
+CVE-2022-35950
+	RESERVED
+CVE-2022-35949
+	RESERVED
+CVE-2022-35948
+	RESERVED
+CVE-2022-35947
+	RESERVED
+CVE-2022-35946
+	RESERVED
+CVE-2022-35945
+	RESERVED
+CVE-2022-35944
+	RESERVED
+CVE-2022-35943
+	RESERVED
+CVE-2022-35942
+	RESERVED
+CVE-2022-35941
+	RESERVED
+CVE-2022-35940
+	RESERVED
+CVE-2022-35939
+	RESERVED
+CVE-2022-35938
+	RESERVED
+CVE-2022-35937
+	RESERVED
+CVE-2022-35936
+	RESERVED
+CVE-2022-35935
+	RESERVED
+CVE-2022-35934
+	RESERVED
+CVE-2022-35933
+	RESERVED
+CVE-2022-35932
+	RESERVED
+CVE-2022-35931
+	RESERVED
+CVE-2022-35930
+	RESERVED
+CVE-2022-35929
+	RESERVED
+CVE-2022-35928
+	RESERVED
+CVE-2022-35927
+	RESERVED
+CVE-2022-35926
+	RESERVED
+CVE-2022-35925
+	RESERVED
+CVE-2022-35924
+	RESERVED
+CVE-2022-35923
+	RESERVED
+CVE-2022-35922
+	RESERVED
+CVE-2022-35921
+	RESERVED
+CVE-2022-35920
+	RESERVED
+CVE-2022-35919
+	RESERVED
+CVE-2022-35918
+	RESERVED
+CVE-2022-35917
+	RESERVED
+CVE-2022-35916
+	RESERVED
+CVE-2022-35915
+	RESERVED
+CVE-2022-35914
+	RESERVED
+CVE-2022-35913
+	RESERVED
+CVE-2022-35912
+	RESERVED
+CVE-2022-35911
+	RESERVED
+CVE-2022-35910
+	RESERVED
+CVE-2022-35909
+	RESERVED
+CVE-2022-35908
+	RESERVED
+CVE-2022-35907
+	RESERVED
+CVE-2022-35906 (An issue was discovered in Bentley MicroStation before 10.17.0.x and B ...)
+	TODO: check
+CVE-2022-35905 (An issue was discovered in Bentley MicroStation before 10.17.0.x and B ...)
+	TODO: check
+CVE-2022-35904 (An issue was discovered in Bentley MicroStation before 10.17.0.x and B ...)
+	TODO: check
+CVE-2022-35903 (An issue was discovered in Bentley MicroStation before 10.17.0.x and B ...)
+	TODO: check
+CVE-2022-35902 (An issue was discovered in Bentley MicroStation before 10.17.0.x and B ...)
+	TODO: check
+CVE-2022-35901 (An issue was discovered in Bentley MicroStation before 10.17.0.x and B ...)
+	TODO: check
+CVE-2022-35900 (An issue was discovered in Bentley MicroStation before 10.17.0.x and B ...)
+	TODO: check
+CVE-2022-35899
+	RESERVED
+CVE-2022-35898
+	RESERVED
+CVE-2022-35897
+	RESERVED
+CVE-2022-35896
+	RESERVED
+CVE-2022-35895
+	RESERVED
+CVE-2022-35894
+	RESERVED
+CVE-2022-35893
+	RESERVED
+CVE-2022-35892
+	RESERVED
+CVE-2022-35891
+	RESERVED
+CVE-2022-35890 (An issue was discovered in Inductive Automation Ignition before 7.9.20 ...)
+	TODO: check
+CVE-2022-35889
+	RESERVED
+CVE-2022-35888
+	RESERVED
+CVE-2022-35887
+	RESERVED
+CVE-2022-35886
+	RESERVED
+CVE-2022-35885
+	RESERVED
+CVE-2022-35884
+	RESERVED
+CVE-2022-35881
+	RESERVED
+CVE-2022-35880
+	RESERVED
+CVE-2022-35879
+	RESERVED
+CVE-2022-35878
+	RESERVED
+CVE-2022-33938
+	RESERVED
 CVE-2022-35877
 	RESERVED
 CVE-2022-35876
@@ -2432,12 +2926,12 @@ CVE-2022-34893
 	RESERVED
 CVE-2022-34892
 	RESERVED
-CVE-2022-34891
-	RESERVED
-CVE-2022-34890
-	RESERVED
-CVE-2022-34889
-	RESERVED
+CVE-2022-34891 (This vulnerability allows local attackers to escalate privileges on af ...)
+	TODO: check
+CVE-2022-34890 (This vulnerability allows local attackers to disclose sensitive inform ...)
+	TODO: check
+CVE-2022-34889 (This vulnerability allows local attackers to escalate privileges on af ...)
+	TODO: check
 CVE-2022-34888
 	RESERVED
 CVE-2022-34887
@@ -8649,8 +9143,8 @@ CVE-2022-32436
 	RESERVED
 CVE-2022-32435
 	RESERVED
-CVE-2022-32434
-	RESERVED
+CVE-2022-32434 (EIPStackGroup OpENer v2.3.0 was discovered to contain a stack overflow ...)
+	TODO: check
 CVE-2022-32433 (itsourcecode Advanced School Management System v1.0 is vulnerable to A ...)
 	NOT-FOR-US: itsourcecode Advanced School Management System
 CVE-2022-32432
@@ -12278,8 +12772,8 @@ CVE-2022-31163
 	RESERVED
 CVE-2022-31162
 	RESERVED
-CVE-2022-31161
-	RESERVED
+CVE-2022-31161 (Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived  ...)
+	TODO: check
 CVE-2022-31160
 	RESERVED
 CVE-2022-31159 (The AWS SDK for Java enables Java developers to work with Amazon Web S ...)
@@ -13767,8 +14261,7 @@ CVE-2022-30635
 	NOTE: https://github.com/golang/go/commit/fb979a50823e5a0575cf6166b3f17a13364cbf81 (go1.18.4)
 	NOTE: https://github.com/golang/go/commit/cd54600b866db0ad068ab8df06c7f5f6cb55c9b3 (go1.17.12)
 	TODO: check details and older versions
-CVE-2022-30634
-	RESERVED
+CVE-2022-30634 (Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 o ...)
 	- golang-1.18 <not-affected> (Only affects Go on Windows)
 	- golang-1.17 <not-affected> (Only affects Go on Windows)
 	- golang-1.15 <not-affected> (Only affects Go on Windows)
@@ -27569,8 +28062,8 @@ CVE-2022-25893
 	RESERVED
 CVE-2022-25892
 	RESERVED
-CVE-2022-25891
-	RESERVED
+CVE-2022-25891 (The package github.com/containrrr/shoutrrr/pkg/util before 0.6.0 are v ...)
+	TODO: check
 CVE-2022-25890
 	RESERVED
 CVE-2022-25888
@@ -27607,8 +28100,8 @@ CVE-2022-25872 (All versions of package fast-string-search are vulnerable to Out
 	NOT-FOR-US: Node fast-string-search
 CVE-2022-25871 (All versions of package querymen are vulnerable to Prototype Pollution ...)
 	NOT-FOR-US: Node querymen
-CVE-2022-25869
-	RESERVED
+CVE-2022-25869 (All versions of package angular are vulnerable to Cross-site Scripting ...)
+	TODO: check
 CVE-2022-25867
 	RESERVED
 CVE-2022-25866 (The package czproject/git-php before 4.0.3 are vulnerable to Command I ...)
@@ -27625,8 +28118,8 @@ CVE-2022-25860
 	RESERVED
 CVE-2022-25859
 	RESERVED
-CVE-2022-25858
-	RESERVED
+CVE-2022-25858 (The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vuln ...)
+	TODO: check
 CVE-2022-25857
 	RESERVED
 CVE-2022-25856 (The package github.com/argoproj/argo-events/sensors/artifacts before 1 ...)
@@ -73761,10 +74254,10 @@ CVE-2021-34989
 	RESERVED
 CVE-2021-34988
 	RESERVED
-CVE-2021-34987
-	RESERVED
-CVE-2021-34986
-	RESERVED
+CVE-2021-34987 (This vulnerability allows local attackers to escalate privileges on af ...)
+	TODO: check
+CVE-2021-34986 (This vulnerability allows local attackers to escalate privileges on af ...)
+	TODO: check
 CVE-2021-34985 (This vulnerability allows remote attackers to disclose sensitive infor ...)
 	NOT-FOR-US: Bentley ContextCapture
 CVE-2021-34984 (This vulnerability allows remote attackers to disclose sensitive infor ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/14fba66e0f1ffedb9491fd4a9c093f94271aee2c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/14fba66e0f1ffedb9491fd4a9c093f94271aee2c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220716/806a0c8b/attachment.htm>


More information about the debian-security-tracker-commits mailing list