[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Nov 24 20:10:33 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
4a8d6d5a by security tracker role at 2022-11-24T20:10:21+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,25 @@
+CVE-2022-45883
+	RESERVED
+CVE-2022-45877
+	RESERVED
+CVE-2022-45875
+	RESERVED
+CVE-2022-45874
+	RESERVED
+CVE-2022-45126
+	RESERVED
+CVE-2022-45118
+	RESERVED
+CVE-2022-44455
+	RESERVED
+CVE-2022-43662
+	RESERVED
+CVE-2022-41802
+	RESERVED
+CVE-2022-4138
+	RESERVED
+CVE-2022-4137
+	RESERVED
 CVE-2022-45873 (systemd 250 and 251 allows local users to achieve a systemd-coredump d ...)
 	- systemd 252-1
 	[bullseye] - systemd <not-affected> (Vulnerable code introduced later)
@@ -21,8 +43,8 @@ CVE-2022-45867
 	RESERVED
 CVE-2022-45866 (qpress before PierreLvx/qpress 20220819 and before version 11.3, as us ...)
 	NOT-FOR-US: qpress
-CVE-2022-4136
-	RESERVED
+CVE-2022-4136 (Dangerous method exposed which can lead to RCE in qmpass/leadshop v1.4 ...)
+	TODO: check
 CVE-2022-4135
 	RESERVED
 CVE-2022-4134
@@ -910,12 +932,12 @@ CVE-2022-44608
 	RESERVED
 CVE-2022-4091
 	RESERVED
-CVE-2022-4090
-	RESERVED
-CVE-2022-4089
-	RESERVED
-CVE-2022-4088
-	RESERVED
+CVE-2022-4090 (A vulnerability was found in rickxy Stock Management System and classi ...)
+	TODO: check
+CVE-2022-4089 (A vulnerability was found in rickxy Stock Management System. It has be ...)
+	TODO: check
+CVE-2022-4088 (A vulnerability was found in rickxy Stock Management System and classi ...)
+	TODO: check
 CVE-2022-4087 (A vulnerability was found in iPXE. It has been declared as problematic ...)
 	- ipxe <not-affected> (Vulnerable code not present)
 	NOTE: Introduced by: https://github.com/ipxe/ipxe/commit/634a86093af9a6d134be8662f25616f4edfec683
@@ -13972,6 +13994,7 @@ CVE-2022-3354 (A vulnerability has been found in Open5GS up to 2.4.10 and classi
 CVE-2022-3353
 	RESERVED
 CVE-2022-3352 (Use After Free in GitHub repository vim/vim prior to 9.0.0614. ...)
+	{DLA-3204-1}
 	- vim 2:9.0.0626-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/d058f182-a49b-40c7-9234-43d4c5a29f60
 	NOTE: https://github.com/vim/vim/commit/ef976323e770315b5fca544efb6b2faa25674d15 (v9.0.0614)
@@ -15157,6 +15180,7 @@ CVE-2022-3258 (Incorrect Permission Assignment for Critical Resource vulnerabili
 CVE-2022-3257 (Mattermost version 7.1.x and earlier fails to sufficiently process a s ...)
 	- mattermost-server <itp> (bug #823556)
 CVE-2022-3256 (Use After Free in GitHub repository vim/vim prior to 9.0.0530. ...)
+	{DLA-3204-1}
 	- vim 2:9.0.0626-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/8336a3df-212a-4f8d-ae34-76ef1f936bb3
 	NOTE: https://github.com/vim/vim/commit/8ecfa2c56b4992c7f067b92488aa9acea5a454ad (v9.0.0530)
@@ -15749,10 +15773,10 @@ CVE-2022-40979 (In JetBrains TeamCity before 2022.04.4 environmental variables o
 	NOT-FOR-US: JetBrains TeamCity
 CVE-2022-40978 (The installer of JetBrains IntelliJ IDEA before 2022.2.2 was vulnerabl ...)
 	NOT-FOR-US: installer of JetBrains IntelliJ IDEA
-CVE-2022-40977
-	RESERVED
-CVE-2022-40976
-	RESERVED
+CVE-2022-40977 (A path traversal vulnerability was discovered in Pilz PASvisu Server b ...)
+	TODO: check
+CVE-2022-40976 (A path traversal vulnerability was discovered in multiple Pilz product ...)
+	TODO: check
 CVE-2022-40969
 	RESERVED
 CVE-2022-40962
@@ -16234,6 +16258,7 @@ CVE-2022-3236 (A code injection vulnerability in the User Portal and Webadmin al
 CVE-2022-40763
 	RESERVED
 CVE-2022-3235 (Use After Free in GitHub repository vim/vim prior to 9.0.0490. ...)
+	{DLA-3204-1}
 	- vim 2:9.0.0626-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/96d5f7a0-a834-4571-b73b-0fe523b941af
 	NOTE: https://github.com/vim/vim/commit/1c3dd8ddcba63c1af5112e567215b3cec2de11d0 (v9.0.0490)
@@ -17479,8 +17504,8 @@ CVE-2022-40268
 	RESERVED
 CVE-2022-40267
 	RESERVED
-CVE-2022-40266
-	RESERVED
+CVE-2022-40266 (Improper Input Validation vulnerability in Mitsubishi Electric GOT2000 ...)
+	TODO: check
 CVE-2022-40265
 	RESERVED
 CVE-2022-40264
@@ -25229,8 +25254,8 @@ CVE-2022-2652 (Depending on the way the format strings in the card label are cra
 	NOTE: Negligible security impact
 CVE-2022-2651 (Authentication Bypass by Primary Weakness in GitHub repository bookwyr ...)
 	NOT-FOR-US: BookWyrm
-CVE-2022-2650
-	RESERVED
+CVE-2022-2650 (Improper Restriction of Excessive Authentication Attempts in GitHub re ...)
+	TODO: check
 CVE-2022-2649
 	RESERVED
 CVE-2022-2648 (A vulnerability was found in SourceCodester Multi Language Hotel Manag ...)
@@ -34544,6 +34569,7 @@ CVE-2022-33980 (Apache Commons Configuration performs variable interpolation, al
 	[buster] - commons-configuration2 <not-affected> (Vulnerable code introduced later)
 	NOTE: https://www.openwall.com/lists/oss-security/2022/07/06/5
 CVE-2022-2129 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. ...)
+	{DLA-3204-1}
 	- vim 2:9.0.0135-1 (bug #1015984)
 	[stretch] - vim <postponed> (Minor issue)
 	NOTE: https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352
@@ -38308,6 +38334,7 @@ CVE-2022-30532 (In affected versions of Octopus Deploy, there is no logging of c
 CVE-2022-29890 (In affected versions of Octopus Server the help sidebar can be customi ...)
 	NOT-FOR-US: Octopus Server
 CVE-2022-2000 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. ...)
+	{DLA-3204-1}
 	- vim 2:9.0.0135-1 (bug #1015984)
 	[bullseye] - vim <no-dsa> (Minor issue)
 	[stretch] - vim <no-dsa> (Minor issue)
@@ -40109,6 +40136,7 @@ CVE-2022-1943 (A flaw out of bounds memory write in the Linux kernel UDF file sy
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2086412
 	NOTE: Fixed by: https://git.kernel.org/linus/c1ad35dd0548ce947d97aaf92f7f2f9a202951cf (5.18-rc7)
 CVE-2022-1942 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...)
+	{DLA-3204-1}
 	- vim 2:9.0.0135-1 (bug #1015984)
 	[bullseye] - vim <no-dsa> (Minor issue)
 	[stretch] - vim <no-dsa> (Minor issue)
@@ -40522,6 +40550,7 @@ CVE-2022-1898 (Use After Free in GitHub repository vim/vim prior to 8.2. ...)
 	NOTE: https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a (v8.2.5024)
 	NOTE: Crash in CLI tool, no security impact
 CVE-2022-1897 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. ...)
+	{DLA-3204-1}
 	- vim 2:9.0.0135-1 (bug #1015984)
 	[bullseye] - vim <no-dsa> (Minor issue)
 	[stretch] - vim <postponed> (Minor issue)
@@ -42697,6 +42726,7 @@ CVE-2022-1786 (A use-after-free flaw was found in the Linux kernel’s io_ur
 	NOTE: https://www.openwall.com/lists/oss-security/2022/05/28/1
 	NOTE: https://blog.kylebot.net/2022/10/16/CVE-2022-1786/
 CVE-2022-1785 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977. ...)
+	{DLA-3204-1}
 	- vim 2:9.0.0135-1 (bug #1015984)
 	[bullseye] - vim <no-dsa> (Minor issue)
 	[stretch] - vim <no-dsa> (Minor issue)
@@ -44685,7 +44715,7 @@ CVE-2022-1622 (LibTIFF master branch has an out-of-bounds read in LZWDecode in l
 	NOTE: https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a (v4.4.0rc1)
 	NOTE: https://gitlab.com/libtiff/libtiff/-/issues/410
 CVE-2022-1621 (Heap buffer overflow in vim_strncpy find_word in GitHub repository vim ...)
-	{DLA-3011-1}
+	{DLA-3204-1 DLA-3011-1}
 	- vim 2:9.0.0135-1 (bug #1015984; unimportant)
 	NOTE: https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
 	NOTE: https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)
@@ -44703,7 +44733,7 @@ CVE-2022-1620 (NULL Pointer Dereference in function vim_regexec_string at regexp
 	NOTE: https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f (v8.2.4901)
 	NOTE: Crash in CLI tool, no security impact
 CVE-2022-1619 (Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub r ...)
-	{DLA-3011-1}
+	{DLA-3204-1 DLA-3011-1}
 	- vim 2:9.0.0135-1 (bug #1015984; unimportant)
 	NOTE: https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
 	NOTE: https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe (v8.2.4899)
@@ -54926,8 +54956,8 @@ CVE-2022-0935 (Host Header injection in password Reset in GitHub repository live
 	NOT-FOR-US: livehelperchat
 CVE-2022-26886
 	RESERVED
-CVE-2022-26885
-	RESERVED
+CVE-2022-26885 (When using tasks to read config files, there is a risk of database pas ...)
+	TODO: check
 CVE-2022-26884 (Users can read any files by log server, Apache DolphinScheduler users  ...)
 	NOT-FOR-US: Apache DolphinScheduler
 CVE-2022-0934 (A single-byte, non-arbitrary write/use-after-free flaw was found in dn ...)
@@ -59044,6 +59074,7 @@ CVE-2022-0698
 CVE-2022-0697 (Open Redirect in GitHub repository archivy/archivy prior to 1.7.0. ...)
 	NOT-FOR-US: Archivy
 CVE-2022-0696 (NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.442 ...)
+	{DLA-3204-1}
 	- vim 2:8.2.4659-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f/
 	NOTE: https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1 (v8.2.4428)
@@ -59585,6 +59616,7 @@ CVE-2022-0630 (Out-of-bounds Read in Homebrew mruby prior to 3.2. ...)
 	NOTE: https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32
 	NOTE: https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad
 CVE-2022-0629 (Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...)
+	{DLA-3204-1}
 	- vim 2:8.2.4659-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877/
 	NOTE: https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc (v8.2.4397)
@@ -63513,6 +63545,7 @@ CVE-2022-21798 (The affected product is vulnerable due to cleartext transmission
 CVE-2022-21154 (An integer overflow vulnerability exists in the fltSaveCMP functionali ...)
 	NOT-FOR-US: LeadTools
 CVE-2022-0392 (Heap-based Buffer Overflow in GitHub repository vim prior to 8.2. ...)
+	{DLA-3204-1}
 	- vim 2:8.2.4659-1
 	[bullseye] - vim <no-dsa> (Minor issue)
 	[stretch] - vim <not-affected> (vulnerable code was introduced later)
@@ -64947,6 +64980,7 @@ CVE-2022-0319 (Out-of-bounds Read in vim/vim prior to 8.2. ...)
 	NOTE: https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9 (v8.2.4154)
 	NOTE: Crash in CLI tool, no security impact
 CVE-2022-0318 (Heap-based Buffer Overflow in vim/vim prior to 8.2. ...)
+	{DLA-3204-1}
 	- vim 2:8.2.4659-1 (bug #1004859; unimportant)
 	[stretch] - vim <postponed> (Fix introduces a test regression)
 	NOTE: https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4a8d6d5ad18ac67e7d69575f5a62f7abb4cf5633

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4a8d6d5ad18ac67e7d69575f5a62f7abb4cf5633
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221124/6b2a1244/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list