[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Oct 3 09:10:28 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
563ac9f8 by security tracker role at 2022-10-03T08:10:13+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,489 @@
+CVE-2022-42251
+	RESERVED
+CVE-2022-42250
+	RESERVED
+CVE-2022-42249
+	RESERVED
+CVE-2022-42248
+	RESERVED
+CVE-2022-42247
+	RESERVED
+CVE-2022-42246
+	RESERVED
+CVE-2022-42245
+	RESERVED
+CVE-2022-42244
+	RESERVED
+CVE-2022-42243
+	RESERVED
+CVE-2022-42242
+	RESERVED
+CVE-2022-42241
+	RESERVED
+CVE-2022-42240
+	RESERVED
+CVE-2022-42239
+	RESERVED
+CVE-2022-42238
+	RESERVED
+CVE-2022-42237
+	RESERVED
+CVE-2022-42236
+	RESERVED
+CVE-2022-42235
+	RESERVED
+CVE-2022-42234
+	RESERVED
+CVE-2022-42233
+	RESERVED
+CVE-2022-42232
+	RESERVED
+CVE-2022-42231
+	RESERVED
+CVE-2022-42230
+	RESERVED
+CVE-2022-42229
+	RESERVED
+CVE-2022-42228
+	RESERVED
+CVE-2022-42227
+	RESERVED
+CVE-2022-42226
+	RESERVED
+CVE-2022-42225
+	RESERVED
+CVE-2022-42224
+	RESERVED
+CVE-2022-42223
+	RESERVED
+CVE-2022-42222
+	RESERVED
+CVE-2022-42221
+	RESERVED
+CVE-2022-42220
+	RESERVED
+CVE-2022-42219
+	RESERVED
+CVE-2022-42218
+	RESERVED
+CVE-2022-42217
+	RESERVED
+CVE-2022-42216
+	RESERVED
+CVE-2022-42215
+	RESERVED
+CVE-2022-42214
+	RESERVED
+CVE-2022-42213
+	RESERVED
+CVE-2022-42212
+	RESERVED
+CVE-2022-42211
+	RESERVED
+CVE-2022-42210
+	RESERVED
+CVE-2022-42209
+	RESERVED
+CVE-2022-42208
+	RESERVED
+CVE-2022-42207
+	RESERVED
+CVE-2022-42206
+	RESERVED
+CVE-2022-42205
+	RESERVED
+CVE-2022-42204
+	RESERVED
+CVE-2022-42203
+	RESERVED
+CVE-2022-42202
+	RESERVED
+CVE-2022-42201
+	RESERVED
+CVE-2022-42200
+	RESERVED
+CVE-2022-42199
+	RESERVED
+CVE-2022-42198
+	RESERVED
+CVE-2022-42197
+	RESERVED
+CVE-2022-42196
+	RESERVED
+CVE-2022-42195
+	RESERVED
+CVE-2022-42194
+	RESERVED
+CVE-2022-42193
+	RESERVED
+CVE-2022-42192
+	RESERVED
+CVE-2022-42191
+	RESERVED
+CVE-2022-42190
+	RESERVED
+CVE-2022-42189
+	RESERVED
+CVE-2022-42188
+	RESERVED
+CVE-2022-42187
+	RESERVED
+CVE-2022-42186
+	RESERVED
+CVE-2022-42185
+	RESERVED
+CVE-2022-42184
+	RESERVED
+CVE-2022-42183
+	RESERVED
+CVE-2022-42182
+	RESERVED
+CVE-2022-42181
+	RESERVED
+CVE-2022-42180
+	RESERVED
+CVE-2022-42179
+	RESERVED
+CVE-2022-42178
+	RESERVED
+CVE-2022-42177
+	RESERVED
+CVE-2022-42176
+	RESERVED
+CVE-2022-42175
+	RESERVED
+CVE-2022-42174
+	RESERVED
+CVE-2022-42173
+	RESERVED
+CVE-2022-42172
+	RESERVED
+CVE-2022-42171
+	RESERVED
+CVE-2022-42170
+	RESERVED
+CVE-2022-42169
+	RESERVED
+CVE-2022-42168
+	RESERVED
+CVE-2022-42167
+	RESERVED
+CVE-2022-42166
+	RESERVED
+CVE-2022-42165
+	RESERVED
+CVE-2022-42164
+	RESERVED
+CVE-2022-42163
+	RESERVED
+CVE-2022-42162
+	RESERVED
+CVE-2022-42161
+	RESERVED
+CVE-2022-42160
+	RESERVED
+CVE-2022-42159
+	RESERVED
+CVE-2022-42158
+	RESERVED
+CVE-2022-42157
+	RESERVED
+CVE-2022-42156
+	RESERVED
+CVE-2022-42155
+	RESERVED
+CVE-2022-42154
+	RESERVED
+CVE-2022-42153
+	RESERVED
+CVE-2022-42152
+	RESERVED
+CVE-2022-42151
+	RESERVED
+CVE-2022-42150
+	RESERVED
+CVE-2022-42149
+	RESERVED
+CVE-2022-42148
+	RESERVED
+CVE-2022-42147
+	RESERVED
+CVE-2022-42146
+	RESERVED
+CVE-2022-42145
+	RESERVED
+CVE-2022-42144
+	RESERVED
+CVE-2022-42143
+	RESERVED
+CVE-2022-42142
+	RESERVED
+CVE-2022-42141
+	RESERVED
+CVE-2022-42140
+	RESERVED
+CVE-2022-42139
+	RESERVED
+CVE-2022-42138
+	RESERVED
+CVE-2022-42137
+	RESERVED
+CVE-2022-42136
+	RESERVED
+CVE-2022-42135
+	RESERVED
+CVE-2022-42134
+	RESERVED
+CVE-2022-42133
+	RESERVED
+CVE-2022-42132
+	RESERVED
+CVE-2022-42131
+	RESERVED
+CVE-2022-42130
+	RESERVED
+CVE-2022-42129
+	RESERVED
+CVE-2022-42128
+	RESERVED
+CVE-2022-42127
+	RESERVED
+CVE-2022-42126
+	RESERVED
+CVE-2022-42125
+	RESERVED
+CVE-2022-42124
+	RESERVED
+CVE-2022-42123
+	RESERVED
+CVE-2022-42122
+	RESERVED
+CVE-2022-42121
+	RESERVED
+CVE-2022-42120
+	RESERVED
+CVE-2022-42119
+	RESERVED
+CVE-2022-42118
+	RESERVED
+CVE-2022-42117
+	RESERVED
+CVE-2022-42116
+	RESERVED
+CVE-2022-42115
+	RESERVED
+CVE-2022-42114
+	RESERVED
+CVE-2022-42113
+	RESERVED
+CVE-2022-42112
+	RESERVED
+CVE-2022-42111
+	RESERVED
+CVE-2022-42110
+	RESERVED
+CVE-2022-42109
+	RESERVED
+CVE-2022-42108
+	RESERVED
+CVE-2022-42107
+	RESERVED
+CVE-2022-42106
+	RESERVED
+CVE-2022-42105
+	RESERVED
+CVE-2022-42104
+	RESERVED
+CVE-2022-42103
+	RESERVED
+CVE-2022-42102
+	RESERVED
+CVE-2022-42101
+	RESERVED
+CVE-2022-42100
+	RESERVED
+CVE-2022-42099
+	RESERVED
+CVE-2022-42098
+	RESERVED
+CVE-2022-42097
+	RESERVED
+CVE-2022-42096
+	RESERVED
+CVE-2022-42095
+	RESERVED
+CVE-2022-42094
+	RESERVED
+CVE-2022-42093
+	RESERVED
+CVE-2022-42092
+	RESERVED
+CVE-2022-42091
+	RESERVED
+CVE-2022-42090
+	RESERVED
+CVE-2022-42089
+	RESERVED
+CVE-2022-42088
+	RESERVED
+CVE-2022-42087
+	RESERVED
+CVE-2022-42086
+	RESERVED
+CVE-2022-42085
+	RESERVED
+CVE-2022-42084
+	RESERVED
+CVE-2022-42083
+	RESERVED
+CVE-2022-42082
+	RESERVED
+CVE-2022-42081
+	RESERVED
+CVE-2022-42080
+	RESERVED
+CVE-2022-42079
+	RESERVED
+CVE-2022-42078
+	RESERVED
+CVE-2022-42077
+	RESERVED
+CVE-2022-42076
+	RESERVED
+CVE-2022-42075
+	RESERVED
+CVE-2022-42074
+	RESERVED
+CVE-2022-42073
+	RESERVED
+CVE-2022-42072
+	RESERVED
+CVE-2022-42071
+	RESERVED
+CVE-2022-42070
+	RESERVED
+CVE-2022-42069
+	RESERVED
+CVE-2022-42068
+	RESERVED
+CVE-2022-42067
+	RESERVED
+CVE-2022-42066
+	RESERVED
+CVE-2022-42065
+	RESERVED
+CVE-2022-42064
+	RESERVED
+CVE-2022-42063
+	RESERVED
+CVE-2022-42062
+	RESERVED
+CVE-2022-42061
+	RESERVED
+CVE-2022-42060
+	RESERVED
+CVE-2022-42059
+	RESERVED
+CVE-2022-42058
+	RESERVED
+CVE-2022-42057
+	RESERVED
+CVE-2022-42056
+	RESERVED
+CVE-2022-42055
+	RESERVED
+CVE-2022-42054
+	RESERVED
+CVE-2022-42053
+	RESERVED
+CVE-2022-42052
+	RESERVED
+CVE-2022-42051
+	RESERVED
+CVE-2022-42050
+	RESERVED
+CVE-2022-42049
+	RESERVED
+CVE-2022-42048
+	RESERVED
+CVE-2022-42047
+	RESERVED
+CVE-2022-42046
+	RESERVED
+CVE-2022-42045
+	RESERVED
+CVE-2022-42044
+	RESERVED
+CVE-2022-42043
+	RESERVED
+CVE-2022-42042
+	RESERVED
+CVE-2022-42041
+	RESERVED
+CVE-2022-42040
+	RESERVED
+CVE-2022-42039
+	RESERVED
+CVE-2022-42038
+	RESERVED
+CVE-2022-42037
+	RESERVED
+CVE-2022-42036
+	RESERVED
+CVE-2022-42035
+	RESERVED
+CVE-2022-42034
+	RESERVED
+CVE-2022-42033
+	RESERVED
+CVE-2022-42032
+	RESERVED
+CVE-2022-42031
+	RESERVED
+CVE-2022-42030
+	RESERVED
+CVE-2022-42029
+	RESERVED
+CVE-2022-42028
+	RESERVED
+CVE-2022-42027
+	RESERVED
+CVE-2022-42026
+	RESERVED
+CVE-2022-42025
+	RESERVED
+CVE-2022-42024
+	RESERVED
+CVE-2022-42023
+	RESERVED
+CVE-2022-42022
+	RESERVED
+CVE-2022-42021
+	RESERVED
+CVE-2022-42020
+	RESERVED
+CVE-2022-42019
+	RESERVED
+CVE-2022-42018
+	RESERVED
+CVE-2022-42017
+	RESERVED
+CVE-2022-42016
+	RESERVED
+CVE-2022-42015
+	RESERVED
+CVE-2022-42014
+	RESERVED
+CVE-2022-42013
+	RESERVED
+CVE-2022-42012
+	RESERVED
+CVE-2022-42011
+	RESERVED
+CVE-2022-42010
+	RESERVED
+CVE-2022-3390
+	RESERVED
 CVE-2022-42009
 	RESERVED
 CVE-2022-3389
@@ -2297,8 +2783,8 @@ CVE-2022-41084
 	RESERVED
 CVE-2022-41083
 	RESERVED
-CVE-2022-41082
-	RESERVED
+CVE-2022-41082 (Microsoft Exchange Server Remote Code Execution Vulnerability. ...)
+	TODO: check
 CVE-2022-41081
 	RESERVED
 CVE-2022-41080
@@ -2381,8 +2867,8 @@ CVE-2022-41042
 	RESERVED
 CVE-2022-41041
 	RESERVED
-CVE-2022-41040
-	RESERVED
+CVE-2022-41040 (Microsoft Exchange Server Elevation of Privilege Vulnerability. ...)
+	TODO: check
 CVE-2022-41039
 	RESERVED
 CVE-2022-41038
@@ -2728,8 +3214,8 @@ CVE-2022-40888
 	RESERVED
 CVE-2022-40887 (SourceCodester Best Student Result Management System 1.0 is vulnerable ...)
 	NOT-FOR-US: SourceCodester Best Student Result Management System
-CVE-2022-40886
-	RESERVED
+CVE-2022-40886 (DedeCMS 5.7.98 has a file upload vulnerability in the background. ...)
+	TODO: check
 CVE-2022-40885
 	RESERVED
 CVE-2022-40884
@@ -7872,6 +8358,7 @@ CVE-2022-38752 (Using snakeYAML to parse untrusted YAML files may be vulnerable
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081 (not public)
 	NOTE: Deemed a false positive by upstream, only added a test
 CVE-2022-38751 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...)
+	{DLA-3132-1}
 	- snakeyaml 1.31-1
 	[bullseye] - snakeyaml <no-dsa> (Minor issue)
 	NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039
@@ -7879,12 +8366,14 @@ CVE-2022-38751 (Using snakeYAML to parse untrusted YAML files may be vulnerable
 	NOTE: Fixed by https://bitbucket.org/snakeyaml/snakeyaml/commits/f3ab4e0f54c37ddb10f00b71d04187bb0ef1799c
 	NOTE: Fixed by https://bitbucket.org/snakeyaml/snakeyaml/commits/6aedd33a811f7347c5dae2940e75940966f59466
 CVE-2022-38750 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...)
+	{DLA-3132-1}
 	- snakeyaml 1.31-1
 	[bullseye] - snakeyaml <no-dsa> (Minor issue)
 	NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027
 	NOTE: Test case: https://bitbucket.org/snakeyaml/snakeyaml/commits/a8a072311547574274036f4a1b91a751b397a055
 CVE-2022-38749 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...)
+	{DLA-3132-1}
 	- snakeyaml 1.31-1
 	[bullseye] - snakeyaml <no-dsa> (Minor issue)
 	NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/525/got-stackoverflowerror-for-many-open
@@ -10691,7 +11180,7 @@ CVE-2022-37799 (Tenda AC1206 V15.03.06.23 was discovered to contain a stack over
 CVE-2022-37798 (Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow v ...)
 	NOT-FOR-US: Tenda
 CVE-2022-37797 (In lighttpd 1.4.65, mod_wstunnel does not initialize a handler functio ...)
-	{DSA-5243-1}
+	{DSA-5243-1 DLA-3133-1}
 	- lighttpd 1.4.66-1
 	[buster] - lighttpd 1.4.53-1+deb10u3
 	NOTE: https://redmine.lighttpd.net/issues/3165
@@ -43851,6 +44340,7 @@ CVE-2022-25858 (The package terser before 4.8.1, from 5.0.0 and before 5.14.2 ar
 	NOTE: https://github.com/terser/terser/commit/a4da7349fdc92c05094f41d33d06d8cd4e90e76b (v5.14.2)
 	NOTE: https://github.com/terser/terser/commit/d8cc5691be980d663c29cc4d5ce67e852d597012 (v4.8.1)
 CVE-2022-25857 (The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable t ...)
+	{DLA-3132-1}
 	- snakeyaml 1.31-1 (bug #1019218)
 	[bullseye] - snakeyaml <no-dsa> (Minor issue)
 	NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/525



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/563ac9f85ca83abca0d22b0c12bc610975c4ea78

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/563ac9f85ca83abca0d22b0c12bc610975c4ea78
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221003/e89c2491/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list