[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Jun 2 09:10:32 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
4faa346b by security tracker role at 2022-06-02T08:10:23+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,67 @@
+CVE-2022-32230
+ RESERVED
+CVE-2022-32229
+ RESERVED
+CVE-2022-32228
+ RESERVED
+CVE-2022-32227
+ RESERVED
+CVE-2022-32226
+ RESERVED
+CVE-2022-32225
+ RESERVED
+CVE-2022-32224
+ RESERVED
+CVE-2022-32223
+ RESERVED
+CVE-2022-32222
+ RESERVED
+CVE-2022-32221
+ RESERVED
+CVE-2022-32220
+ RESERVED
+CVE-2022-32219
+ RESERVED
+CVE-2022-32218
+ RESERVED
+CVE-2022-32217
+ RESERVED
+CVE-2022-32216
+ RESERVED
+CVE-2022-32215
+ RESERVED
+CVE-2022-32214
+ RESERVED
+CVE-2022-32213
+ RESERVED
+CVE-2022-32212
+ RESERVED
+CVE-2022-32211
+ RESERVED
+CVE-2022-32210
+ RESERVED
+CVE-2022-32209
+ RESERVED
+CVE-2022-32208
+ RESERVED
+CVE-2022-32207
+ RESERVED
+CVE-2022-32206
+ RESERVED
+CVE-2022-32205
+ RESERVED
+CVE-2022-31734
+ RESERVED
+CVE-2022-1976
+ RESERVED
+CVE-2022-1975
+ RESERVED
+CVE-2022-1974
+ RESERVED
+CVE-2022-1973
+ RESERVED
+CVE-2022-1972
+ RESERVED
CVE-2022-32204
RESERVED
CVE-2022-32203
@@ -503,44 +567,44 @@ CVE-2022-31986
RESERVED
CVE-2022-31985
RESERVED
-CVE-2022-31984
- RESERVED
-CVE-2022-31983
- RESERVED
-CVE-2022-31982
- RESERVED
-CVE-2022-31981
- RESERVED
-CVE-2022-31980
- RESERVED
+CVE-2022-31984 (Online Fire Reporting System v1.0 is vulnerable to SQL Injection via / ...)
+ TODO: check
+CVE-2022-31983 (Online Fire Reporting System v1.0 is vulnerable to SQL Injection via / ...)
+ TODO: check
+CVE-2022-31982 (Online Fire Reporting System v1.0 is vulnerable to SQL Injection via / ...)
+ TODO: check
+CVE-2022-31981 (Online Fire Reporting System v1.0 is vulnerable to SQL Injection via / ...)
+ TODO: check
+CVE-2022-31980 (Online Fire Reporting System v1.0 is vulnerable to SQL Injection via / ...)
+ TODO: check
CVE-2022-31979
RESERVED
-CVE-2022-31978
- RESERVED
-CVE-2022-31977
- RESERVED
-CVE-2022-31976
- RESERVED
-CVE-2022-31975
- RESERVED
-CVE-2022-31974
- RESERVED
-CVE-2022-31973
- RESERVED
+CVE-2022-31978 (Online Fire Reporting System v1.0 is vulnerable to SQL Injection via / ...)
+ TODO: check
+CVE-2022-31977 (Online Fire Reporting System v1.0 is vulnerable to SQL Injection via / ...)
+ TODO: check
+CVE-2022-31976 (Online Fire Reporting System v1.0 is vulnerable to SQL Injection via / ...)
+ TODO: check
+CVE-2022-31975 (Online Fire Reporting System v1.0 is vulnerable to SQL Injection via / ...)
+ TODO: check
+CVE-2022-31974 (Online Fire Reporting System v1.0 is vulnerable to SQL Injection via / ...)
+ TODO: check
+CVE-2022-31973 (Online Fire Reporting System v1.0 is vulnerable to Delete any file via ...)
+ TODO: check
CVE-2022-31972
RESERVED
-CVE-2022-31971
- RESERVED
-CVE-2022-31970
- RESERVED
-CVE-2022-31969
- RESERVED
+CVE-2022-31971 (ChatBot App with Suggestion v1.0 is vulnerable to SQL Injection via /s ...)
+ TODO: check
+CVE-2022-31970 (ChatBot App with Suggestion v1.0 is vulnerable to SQL Injection via /s ...)
+ TODO: check
+CVE-2022-31969 (ChatBot App with Suggestion v1.0 is vulnerable to SQL Injection via /s ...)
+ TODO: check
CVE-2022-31968
RESERVED
CVE-2022-31967
RESERVED
-CVE-2022-31966
- RESERVED
+CVE-2022-31966 (ChatBot App with Suggestion v1.0 is vulnerable to Delete any file via ...)
+ TODO: check
CVE-2022-31965 (Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection ...)
NOT-FOR-US: Rescue Dispatch Management System
CVE-2022-31964 (Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection ...)
@@ -966,8 +1030,8 @@ CVE-2022-1931 (Incorrect Synchronization in GitHub repository polonel/trudesk pr
NOT-FOR-US: Trudesk
CVE-2022-1930
RESERVED
-CVE-2022-1929
- RESERVED
+CVE-2022-1929 (An exponential ReDoS (Regular Expression Denial of Service) can be tri ...)
+ TODO: check
CVE-2022-1928 (Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gite ...)
- gitea <removed>
CVE-2022-1927 (Buffer Over-read in GitHub repository vim/vim prior to 8.2. ...)
@@ -2072,9 +2136,9 @@ CVE-2022-31469
RESERVED
CVE-2022-31468
RESERVED
-CVE-2022-31467 (Quick Heal Total Security before 12.1.1.27 allows DLL hijacking during ...)
+CVE-2022-31467 (A DLL hijacking vulnerability in the installed for Quick Heal Total Se ...)
NOT-FOR-US: Quick Heal Total Security
-CVE-2022-31466 (Quick Heal Total Security before 12.1.1.27 has a TOCTOU race condition ...)
+CVE-2022-31466 (Time of Check - Time of Use (TOCTOU) vulnerability in Quick Heal Total ...)
NOT-FOR-US: Quick Heal Total Security
CVE-2022-31465
RESERVED
@@ -3071,8 +3135,8 @@ CVE-2022-31024
RESERVED
CVE-2022-31023
RESERVED
-CVE-2022-31022
- RESERVED
+CVE-2022-31022 (Bleve is a text indexing library for go. Bleve includes HTTP utilities ...)
+ TODO: check
CVE-2022-31021
RESERVED
CVE-2022-31020
@@ -3126,8 +3190,8 @@ CVE-2022-31001 (Sofia-SIP is an open-source Session Initiation Protocol (SIP) Us
- sofia-sip <unfixed>
NOTE: https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-79jq-hh82-cv9g
NOTE: https://github.com/freeswitch/sofia-sip/commit/a99804b336d0e16d26ab7119d56184d2d7110a36 (v1.13.8)
-CVE-2022-31000
- RESERVED
+CVE-2022-31000 (solidus_backend is the admin interface for the Solidus e-commerce fram ...)
+ TODO: check
CVE-2022-30999 (FriendsofFlarum (FoF) Upload is an extension that handles file uploads ...)
TODO: check
CVE-2022-30996
@@ -5266,8 +5330,8 @@ CVE-2022-30279 (An issue was discovered in Stormshield Network Security (SNS) 4.
NOT-FOR-US: Stormshield Network Security (SNS)
CVE-2022-30278 (A vulnerability in Black Duck Hub’s embedded MadCap Flare docume ...)
NOT-FOR-US: Black Duck Hub
-CVE-2022-30277
- RESERVED
+CVE-2022-30277 (BD Synapsys™, versions 4.20, 4.20 SR1, and 4.30, contain an insu ...)
+ TODO: check
CVE-2022-30276
RESERVED
CVE-2022-30275
@@ -5525,8 +5589,8 @@ CVE-2022-30192
RESERVED
CVE-2022-30191
RESERVED
-CVE-2022-30190
- RESERVED
+CVE-2022-30190 (Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution ...)
+ TODO: check
CVE-2022-30189
RESERVED
CVE-2022-30188
@@ -5649,10 +5713,10 @@ CVE-2022-30130 (.NET Framework Denial of Service Vulnerability. ...)
NOT-FOR-US: Microsoft
CVE-2022-30129 (Visual Studio Code Remote Code Execution Vulnerability. ...)
NOT-FOR-US: Microsoft
-CVE-2022-30128
- RESERVED
-CVE-2022-30127
- RESERVED
+CVE-2022-30128 (Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. ...)
+ TODO: check
+CVE-2022-30127 (Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. ...)
+ TODO: check
CVE-2022-1567 (The WP-JS plugin for WordPress contains a script called wp-js.php with ...)
NOT-FOR-US: WP-JS plugin for WordPress
CVE-2022-1566 (The Quotes llama WordPress plugin through 0.7 does not sanitise and es ...)
@@ -5718,8 +5782,7 @@ CVE-2022-30117
RESERVED
CVE-2022-30116
RESERVED
-CVE-2022-30115 [curl: HSTS bypass via trailing dot]
- RESERVED
+CVE-2022-30115 (Using its HSTS support, curl can be instructed to use HTTPS directly i ...)
- curl 7.83.1-1
[bullseye] - curl <not-affected> (Vulnerable code introduced later)
[buster] - curl <not-affected> (Vulnerable code introduced later)
@@ -7085,8 +7148,8 @@ CVE-2022-29661 (CSCMS Music Portal System v4.2 was discovered to contain a blind
NOT-FOR-US: CSCMS Music Portal System
CVE-2022-29660 (CSCMS Music Portal System v4.2 was discovered to contain a SQL injecti ...)
NOT-FOR-US: CSCMS Music Portal System
-CVE-2022-29659
- RESERVED
+CVE-2022-29659 (Responsive Online Blog v1.0 was discovered to contain a SQL injection ...)
+ TODO: check
CVE-2022-29658
RESERVED
CVE-2022-29657
@@ -8307,16 +8370,16 @@ CVE-2022-29238
RESERVED
CVE-2022-29237 (Opencast is a free and open source solution for automated video captur ...)
NOT-FOR-US: Opencast
-CVE-2022-29236
- RESERVED
-CVE-2022-29235
- RESERVED
-CVE-2022-29234
- RESERVED
-CVE-2022-29233
- RESERVED
-CVE-2022-29232
- RESERVED
+CVE-2022-29236 (BigBlueButton is an open source web conferencing system. Starting in v ...)
+ TODO: check
+CVE-2022-29235 (BigBlueButton is an open source web conferencing system. Starting in v ...)
+ TODO: check
+CVE-2022-29234 (BigBlueButton is an open source web conferencing system. Starting in v ...)
+ TODO: check
+CVE-2022-29233 (BigBlueButton is an open source web conferencing system. In BigBlueBut ...)
+ TODO: check
+CVE-2022-29232 (BigBlueButton is an open source web conferencing system. Starting with ...)
+ TODO: check
CVE-2022-29231
RESERVED
CVE-2022-29230 (Hydrogen is a React-based framework for building dynamic, Shopify-powe ...)
@@ -8467,8 +8530,8 @@ CVE-2022-29171 (Sourcegraph is a fast and featureful code search and navigation
NOT-FOR-US: Sourcegraph
CVE-2022-29170 (Grafana is an open-source platform for monitoring and observability. I ...)
- grafana <not-affected> (Specific to Grafana Enterprise)
-CVE-2022-29169
- RESERVED
+CVE-2022-29169 (BigBlueButton is an open source web conferencing system. Versions star ...)
+ TODO: check
CVE-2022-29168
RESERVED
CVE-2022-29167 (Hawk is an HTTP authentication scheme providing mechanisms for making ...)
@@ -12585,22 +12648,19 @@ CVE-2022-26346
RESERVED
CVE-2022-1060
RESERVED
-CVE-2022-27782 [curl: TLS and SSH connection too eager reuse]
- RESERVED
+CVE-2022-27782 (libcurl would reuse a previously created connection even when a TLS or ...)
- curl 7.83.1-1
NOTE: https://www.openwall.com/lists/oss-security/2022/05/11/5
NOTE: https://curl.se/docs/CVE-2022-27782.html
NOTE: Fixed by: https://github.com/curl/curl/commit/f18af4f874cecab82a9797e8c7541e0990c7a64c (curl-7_83_1)
NOTE: Fixed by: https://github.com/curl/curl/commit/1645e9b44505abd5cbaf65da5282c3f33b5924a5 (curl-7_83_1)
-CVE-2022-27781 [curl: CERTINFO never-ending busy-loop]
- RESERVED
+CVE-2022-27781 (libcurl provides the `CURLOPT_CERTINFO` option to allow applications t ...)
- curl 7.83.1-1
NOTE: https://www.openwall.com/lists/oss-security/2022/05/11/4
NOTE: https://curl.se/docs/CVE-2022-27781.html
NOTE: Introduced by: https://github.com/curl/curl/commit/f6c335d63f2da025a0a3efde1fe59e3bb7189b70 (curl-7_34_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/curl-7_83_1)
-CVE-2022-27780 [curl: percent-encoded path separator in URL host]
- RESERVED
+CVE-2022-27780 (The curl URL parser wrongly accepts percent-encoded URL separators lik ...)
- curl 7.83.1-1
[bullseye] - curl <not-affected> (Vulnerable code introduced later)
[buster] - curl <not-affected> (Vulnerable code introduced later)
@@ -12609,8 +12669,7 @@ CVE-2022-27780 [curl: percent-encoded path separator in URL host]
NOTE: https://curl.se/docs/CVE-2022-27780.html
NOTE: Introduced by: https://github.com/curl/curl/commit/9a8564a920188e49d5bd8c1c8573ddef97f6e03a (curl-7_80_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/914aaab9153764ef8fa4178215b8ad89d3ac263a (curl-7_83_1)
-CVE-2022-27779 [curl: cookie for trailing dot TLD]
- RESERVED
+CVE-2022-27779 (libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) ...)
- curl 7.83.1-1
[bullseye] - curl <not-affected> (Vulnerable code introduced later)
[buster] - curl <not-affected> (Vulnerable code introduced later)
@@ -12619,8 +12678,7 @@ CVE-2022-27779 [curl: cookie for trailing dot TLD]
NOTE: https://curl.se/docs/CVE-2022-27779.html
NOTE: Introduced by: https://github.com/curl/curl/commit/b27ad8e1d3e68eb3214fcbb398ca436873aa7c67 (curl-7_82_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/7e92d12b4e6911f424678a133b19de670e183a59 (curl-7_83_1)
-CVE-2022-27778 [curl: removes wrong file on error]
- RESERVED
+CVE-2022-27778 (A use of incorrectly resolved name vulnerability fixed in 7.83.1 might ...)
- curl 7.83.1-1
[bullseye] - curl <not-affected> (Vulnerable code introduced later)
[buster] - curl <not-affected> (Vulnerable code introduced later)
@@ -12637,21 +12695,18 @@ CVE-2022-27777 (A XSS Vulnerability in Action View tag helpers >= 5.2.0 and &
NOTE: Regression fix: https://github.com/rails/rails/commit/1b5df893d82a27da907e9b8b75deff13179d1df3 (v6.0.5)
NOTE: Fixed by: https://github.com/rails/rails/commit/1278c0f0b4a18ea199f92b666b8b94954a74c20b (v5.2.7.1)
NOTE: Regression fix: https://github.com/rails/rails/commit/a1b8a9b5e5a905d0aeabf532e3f6b74116d5cce6 (v5.2.8)
-CVE-2022-27776 [Auth/cookie leak on redirect]
- RESERVED
+CVE-2022-27776 (A insufficiently protected credentials vulnerability in fixed in curl ...)
- curl 7.83.0-1 (bug #1010252)
NOTE: https://curl.se/docs/CVE-2022-27776.html
NOTE: Fixed by: https://github.com/curl/curl/commit/6e659993952aa5f90f48864be84a1bbb047fc258 (curl-7_83_0)
-CVE-2022-27775 [Bad local IPv6 connection reuse]
- RESERVED
+CVE-2022-27775 (An information disclosure vulnerability exists in curl 7.65.0 to 7.82. ...)
- curl 7.83.0-1 (bug #1010253)
[buster] - curl <not-affected> (Vulnerable code introduced later)
[stretch] - curl <not-affected> (Vulnerable code introduced later)
NOTE: https://curl.se/docs/CVE-2022-27775.html
NOTE: Introduced by: https://github.com/curl/curl/commit/2d0e9b40d3237b1450cbbfbcb996da244d964898 (curl-7_65_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/058f98dc3fe595f21dc26a5b9b1699e519ba5705 (curl-7_83_0)
-CVE-2022-27774 [Credential leak on redirect]
- RESERVED
+CVE-2022-27774 (An insufficiently protected credentials vulnerability exists in curl 4 ...)
- curl 7.83.0-1 (bug #1010254)
NOTE: https://curl.se/docs/CVE-2022-27774.html
NOTE: Fixed by: https://github.com/curl/curl/commit/620ea21410030a9977396b4661806bc187231b79 (curl-7_83_0)
@@ -15054,8 +15109,8 @@ CVE-2022-26907 (Azure SDK for .NET Information Disclosure Vulnerability. ...)
NOT-FOR-US: Microsoft
CVE-2022-26906
RESERVED
-CVE-2022-26905
- RESERVED
+CVE-2022-26905 (Microsoft Edge (Chromium-based) Spoofing Vulnerability. ...)
+ TODO: check
CVE-2022-26904 (Windows User Profile Service Elevation of Privilege Vulnerability. ...)
NOT-FOR-US: Microsoft
CVE-2022-26903 (Windows Graphics Component Remote Code Execution Vulnerability. ...)
@@ -20807,8 +20862,8 @@ CVE-2022-24850 (Discourse is an open source platform for community discussion. A
NOT-FOR-US: Discourse
CVE-2022-24849 (DisCatSharp is a Discord API wrapper for .NET. Users of versions 9.8.5 ...)
NOT-FOR-US: DisCatSharp
-CVE-2022-24848
- RESERVED
+CVE-2022-24848 (DHIS2 is an information system for data capture, management, validatio ...)
+ TODO: check
CVE-2022-24847 (GeoServer is an open source software server written in Java that allow ...)
NOT-FOR-US: geoserver
CVE-2022-24846 (GeoWebCache is a tile caching server implemented in Java. The GeoWebCa ...)
@@ -28393,8 +28448,8 @@ CVE-2022-22769 (The Web server component of TIBCO Software Inc.'s TIBCO EBX, TIB
NOT-FOR-US: TIBCO
CVE-2022-22768
RESERVED
-CVE-2022-22767
- RESERVED
+CVE-2022-22767 (Specific BD Pyxis™ products were installed with default credenti ...)
+ TODO: check
CVE-2022-22766 (Hardcoded credentials are used in specific BD Pyxis products. If explo ...)
NOT-FOR-US: BD Pyxis
CVE-2022-22765 (BD Viper LT system, versions 2.0 and later, contains hardcoded credent ...)
@@ -40445,12 +40500,12 @@ CVE-2021-43310
RESERVED
CVE-2021-43309
RESERVED
-CVE-2021-43308
- RESERVED
-CVE-2021-43307
- RESERVED
-CVE-2021-43306
- RESERVED
+CVE-2021-43308 (An exponential ReDoS (Regular Expression Denial of Service) can be tri ...)
+ TODO: check
+CVE-2021-43307 (An exponential ReDoS (Regular Expression Denial of Service) can be tri ...)
+ TODO: check
+CVE-2021-43306 (An exponential ReDoS (Regular Expression Denial of Service) can be tri ...)
+ TODO: check
CVE-2021-43305 (Heap buffer overflow in Clickhouse's LZ4 compression codec when parsin ...)
- clickhouse <unfixed> (bug #1008216)
NOTE: https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9 (v21.9.1.7685)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4faa346b705537aa1bffa2dcd1f1d477567ef914
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4faa346b705537aa1bffa2dcd1f1d477567ef914
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220602/c298838b/attachment.htm>
More information about the debian-security-tracker-commits
mailing list