[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Nov 28 08:10:25 GMT 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
1edab07f by security tracker role at 2022-11-28T08:10:16+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,413 @@
+CVE-2022-46139
+ RESERVED
+CVE-2022-46138
+ RESERVED
+CVE-2022-46137
+ RESERVED
+CVE-2022-46136
+ RESERVED
+CVE-2022-46135
+ RESERVED
+CVE-2022-46134
+ RESERVED
+CVE-2022-46133
+ RESERVED
+CVE-2022-46132
+ RESERVED
+CVE-2022-46131
+ RESERVED
+CVE-2022-46130
+ RESERVED
+CVE-2022-46129
+ RESERVED
+CVE-2022-46128
+ RESERVED
+CVE-2022-46127
+ RESERVED
+CVE-2022-46126
+ RESERVED
+CVE-2022-46125
+ RESERVED
+CVE-2022-46124
+ RESERVED
+CVE-2022-46123
+ RESERVED
+CVE-2022-46122
+ RESERVED
+CVE-2022-46121
+ RESERVED
+CVE-2022-46120
+ RESERVED
+CVE-2022-46119
+ RESERVED
+CVE-2022-46118
+ RESERVED
+CVE-2022-46117
+ RESERVED
+CVE-2022-46116
+ RESERVED
+CVE-2022-46115
+ RESERVED
+CVE-2022-46114
+ RESERVED
+CVE-2022-46113
+ RESERVED
+CVE-2022-46112
+ RESERVED
+CVE-2022-46111
+ RESERVED
+CVE-2022-46110
+ RESERVED
+CVE-2022-46109
+ RESERVED
+CVE-2022-46108
+ RESERVED
+CVE-2022-46107
+ RESERVED
+CVE-2022-46106
+ RESERVED
+CVE-2022-46105
+ RESERVED
+CVE-2022-46104
+ RESERVED
+CVE-2022-46103
+ RESERVED
+CVE-2022-46102
+ RESERVED
+CVE-2022-46101
+ RESERVED
+CVE-2022-46100
+ RESERVED
+CVE-2022-46099
+ RESERVED
+CVE-2022-46098
+ RESERVED
+CVE-2022-46097
+ RESERVED
+CVE-2022-46096
+ RESERVED
+CVE-2022-46095
+ RESERVED
+CVE-2022-46094
+ RESERVED
+CVE-2022-46093
+ RESERVED
+CVE-2022-46092
+ RESERVED
+CVE-2022-46091
+ RESERVED
+CVE-2022-46090
+ RESERVED
+CVE-2022-46089
+ RESERVED
+CVE-2022-46088
+ RESERVED
+CVE-2022-46087
+ RESERVED
+CVE-2022-46086
+ RESERVED
+CVE-2022-46085
+ RESERVED
+CVE-2022-46084
+ RESERVED
+CVE-2022-46083
+ RESERVED
+CVE-2022-46082
+ RESERVED
+CVE-2022-46081
+ RESERVED
+CVE-2022-46080
+ RESERVED
+CVE-2022-46079
+ RESERVED
+CVE-2022-46078
+ RESERVED
+CVE-2022-46077
+ RESERVED
+CVE-2022-46076
+ RESERVED
+CVE-2022-46075
+ RESERVED
+CVE-2022-46074
+ RESERVED
+CVE-2022-46073
+ RESERVED
+CVE-2022-46072
+ RESERVED
+CVE-2022-46071
+ RESERVED
+CVE-2022-46070
+ RESERVED
+CVE-2022-46069
+ RESERVED
+CVE-2022-46068
+ RESERVED
+CVE-2022-46067
+ RESERVED
+CVE-2022-46066
+ RESERVED
+CVE-2022-46065
+ RESERVED
+CVE-2022-46064
+ RESERVED
+CVE-2022-46063
+ RESERVED
+CVE-2022-46062
+ RESERVED
+CVE-2022-46061
+ RESERVED
+CVE-2022-46060
+ RESERVED
+CVE-2022-46059
+ RESERVED
+CVE-2022-46058
+ RESERVED
+CVE-2022-46057
+ RESERVED
+CVE-2022-46056
+ RESERVED
+CVE-2022-46055
+ RESERVED
+CVE-2022-46054
+ RESERVED
+CVE-2022-46053
+ RESERVED
+CVE-2022-46052
+ RESERVED
+CVE-2022-46051
+ RESERVED
+CVE-2022-46050
+ RESERVED
+CVE-2022-46049
+ RESERVED
+CVE-2022-46048
+ RESERVED
+CVE-2022-46047
+ RESERVED
+CVE-2022-46046
+ RESERVED
+CVE-2022-46045
+ RESERVED
+CVE-2022-46044
+ RESERVED
+CVE-2022-46043
+ RESERVED
+CVE-2022-46042
+ RESERVED
+CVE-2022-46041
+ RESERVED
+CVE-2022-46040
+ RESERVED
+CVE-2022-46039
+ RESERVED
+CVE-2022-46038
+ RESERVED
+CVE-2022-46037
+ RESERVED
+CVE-2022-46036
+ RESERVED
+CVE-2022-46035
+ RESERVED
+CVE-2022-46034
+ RESERVED
+CVE-2022-46033
+ RESERVED
+CVE-2022-46032
+ RESERVED
+CVE-2022-46031
+ RESERVED
+CVE-2022-46030
+ RESERVED
+CVE-2022-46029
+ RESERVED
+CVE-2022-46028
+ RESERVED
+CVE-2022-46027
+ RESERVED
+CVE-2022-46026
+ RESERVED
+CVE-2022-46025
+ RESERVED
+CVE-2022-46024
+ RESERVED
+CVE-2022-46023
+ RESERVED
+CVE-2022-46022
+ RESERVED
+CVE-2022-46021
+ RESERVED
+CVE-2022-46020
+ RESERVED
+CVE-2022-46019
+ RESERVED
+CVE-2022-46018
+ RESERVED
+CVE-2022-46017
+ RESERVED
+CVE-2022-46016
+ RESERVED
+CVE-2022-46015
+ RESERVED
+CVE-2022-46014
+ RESERVED
+CVE-2022-46013
+ RESERVED
+CVE-2022-46012
+ RESERVED
+CVE-2022-46011
+ RESERVED
+CVE-2022-46010
+ RESERVED
+CVE-2022-46009
+ RESERVED
+CVE-2022-46008
+ RESERVED
+CVE-2022-46007
+ RESERVED
+CVE-2022-46006
+ RESERVED
+CVE-2022-46005
+ RESERVED
+CVE-2022-46004
+ RESERVED
+CVE-2022-46003
+ RESERVED
+CVE-2022-46002
+ RESERVED
+CVE-2022-46001
+ RESERVED
+CVE-2022-46000
+ RESERVED
+CVE-2022-45999
+ RESERVED
+CVE-2022-45998
+ RESERVED
+CVE-2022-45997
+ RESERVED
+CVE-2022-45996
+ RESERVED
+CVE-2022-45995
+ RESERVED
+CVE-2022-45994
+ RESERVED
+CVE-2022-45993
+ RESERVED
+CVE-2022-45992
+ RESERVED
+CVE-2022-45991
+ RESERVED
+CVE-2022-45990
+ RESERVED
+CVE-2022-45989
+ RESERVED
+CVE-2022-45988
+ RESERVED
+CVE-2022-45987
+ RESERVED
+CVE-2022-45986
+ RESERVED
+CVE-2022-45985
+ RESERVED
+CVE-2022-45984
+ RESERVED
+CVE-2022-45983
+ RESERVED
+CVE-2022-45982
+ RESERVED
+CVE-2022-45981
+ RESERVED
+CVE-2022-45980
+ RESERVED
+CVE-2022-45979
+ RESERVED
+CVE-2022-45978
+ RESERVED
+CVE-2022-45977
+ RESERVED
+CVE-2022-45976
+ RESERVED
+CVE-2022-45975
+ RESERVED
+CVE-2022-45974
+ RESERVED
+CVE-2022-45973
+ RESERVED
+CVE-2022-45972
+ RESERVED
+CVE-2022-45971
+ RESERVED
+CVE-2022-45970
+ RESERVED
+CVE-2022-45969
+ RESERVED
+CVE-2022-45968
+ RESERVED
+CVE-2022-45967
+ RESERVED
+CVE-2022-45966
+ RESERVED
+CVE-2022-45965
+ RESERVED
+CVE-2022-45964
+ RESERVED
+CVE-2022-45963
+ RESERVED
+CVE-2022-45962
+ RESERVED
+CVE-2022-45961
+ RESERVED
+CVE-2022-45960
+ RESERVED
+CVE-2022-45959
+ RESERVED
+CVE-2022-45958
+ RESERVED
+CVE-2022-45957
+ RESERVED
+CVE-2022-45956
+ RESERVED
+CVE-2022-45955
+ RESERVED
+CVE-2022-45954
+ RESERVED
+CVE-2022-45953
+ RESERVED
+CVE-2022-45952
+ RESERVED
+CVE-2022-45951
+ RESERVED
+CVE-2022-45950
+ RESERVED
+CVE-2022-45949
+ RESERVED
+CVE-2022-45948
+ RESERVED
+CVE-2022-45947
+ RESERVED
+CVE-2022-45946
+ RESERVED
+CVE-2022-45945
+ RESERVED
+CVE-2022-45944
+ RESERVED
+CVE-2022-45943
+ RESERVED
+CVE-2022-45942
+ RESERVED
+CVE-2022-45941
+ RESERVED
+CVE-2022-45940
+ RESERVED
+CVE-2022-45939 (GNU Emacs through 28.2 allows attackers to execute commands via shell ...)
+ TODO: check
+CVE-2022-45938
+ RESERVED
+CVE-2022-45937
+ RESERVED
+CVE-2022-45936
+ RESERVED
+CVE-2022-4146
+ RESERVED
CVE-2022-45935
RESERVED
CVE-2022-45934 (An issue was discovered in the Linux kernel through 6.0.10. l2cap_conf ...)
@@ -183,6 +593,7 @@ CVE-2022-45866 (qpress before PierreLvx/qpress 20220819 and before version 11.3,
CVE-2022-4136 (Dangerous method exposed which can lead to RCE in qmpass/leadshop v1.4 ...)
NOT-FOR-US: leadshop
CVE-2022-4135 (Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 a ...)
+ {DSA-5289-1}
- chromium 107.0.5304.121-1
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2022-4134
@@ -2651,6 +3062,7 @@ CVE-2022-45061 (An issue was discovered in Python before 3.11.1. An unnecessary
NOTE: https://github.com/python/cpython/pull/99231 (3.8-branch)
NOTE: https://github.com/python/cpython/commit/b0b590be9597fd5919228d251812dd54145f70a7 (3.7-branch)
CVE-2022-45060 (An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and ...)
+ {DLA-3208-1}
- varnish <unfixed> (bug #1023751)
NOTE: https://varnish-cache.org/security/VSV00011.html
NOTE: https://github.com/varnishcache/varnish-cache/commit/515a93df894430767073ccd8265497b6b25b54b5
@@ -194003,6 +194415,7 @@ CVE-2020-11655 (SQLite through 3.31.1 allows attackers to cause a denial of serv
CVE-2020-11654
RESERVED
CVE-2020-11653 (An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6 ...)
+ {DLA-3208-1}
- varnish 6.4.0-1 (bug #956307)
[stretch] - varnish <not-affected> (Only affects 6.x)
[jessie] - varnish <not-affected> (Only affects 6.x)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1edab07f46e53758f71402e58d783d0d1732be05
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1edab07f46e53758f71402e58d783d0d1732be05
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221128/82e58f30/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list