[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Oct 3 09:10:28 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
563ac9f8 by security tracker role at 2022-10-03T08:10:13+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,489 @@
+CVE-2022-42251
+ RESERVED
+CVE-2022-42250
+ RESERVED
+CVE-2022-42249
+ RESERVED
+CVE-2022-42248
+ RESERVED
+CVE-2022-42247
+ RESERVED
+CVE-2022-42246
+ RESERVED
+CVE-2022-42245
+ RESERVED
+CVE-2022-42244
+ RESERVED
+CVE-2022-42243
+ RESERVED
+CVE-2022-42242
+ RESERVED
+CVE-2022-42241
+ RESERVED
+CVE-2022-42240
+ RESERVED
+CVE-2022-42239
+ RESERVED
+CVE-2022-42238
+ RESERVED
+CVE-2022-42237
+ RESERVED
+CVE-2022-42236
+ RESERVED
+CVE-2022-42235
+ RESERVED
+CVE-2022-42234
+ RESERVED
+CVE-2022-42233
+ RESERVED
+CVE-2022-42232
+ RESERVED
+CVE-2022-42231
+ RESERVED
+CVE-2022-42230
+ RESERVED
+CVE-2022-42229
+ RESERVED
+CVE-2022-42228
+ RESERVED
+CVE-2022-42227
+ RESERVED
+CVE-2022-42226
+ RESERVED
+CVE-2022-42225
+ RESERVED
+CVE-2022-42224
+ RESERVED
+CVE-2022-42223
+ RESERVED
+CVE-2022-42222
+ RESERVED
+CVE-2022-42221
+ RESERVED
+CVE-2022-42220
+ RESERVED
+CVE-2022-42219
+ RESERVED
+CVE-2022-42218
+ RESERVED
+CVE-2022-42217
+ RESERVED
+CVE-2022-42216
+ RESERVED
+CVE-2022-42215
+ RESERVED
+CVE-2022-42214
+ RESERVED
+CVE-2022-42213
+ RESERVED
+CVE-2022-42212
+ RESERVED
+CVE-2022-42211
+ RESERVED
+CVE-2022-42210
+ RESERVED
+CVE-2022-42209
+ RESERVED
+CVE-2022-42208
+ RESERVED
+CVE-2022-42207
+ RESERVED
+CVE-2022-42206
+ RESERVED
+CVE-2022-42205
+ RESERVED
+CVE-2022-42204
+ RESERVED
+CVE-2022-42203
+ RESERVED
+CVE-2022-42202
+ RESERVED
+CVE-2022-42201
+ RESERVED
+CVE-2022-42200
+ RESERVED
+CVE-2022-42199
+ RESERVED
+CVE-2022-42198
+ RESERVED
+CVE-2022-42197
+ RESERVED
+CVE-2022-42196
+ RESERVED
+CVE-2022-42195
+ RESERVED
+CVE-2022-42194
+ RESERVED
+CVE-2022-42193
+ RESERVED
+CVE-2022-42192
+ RESERVED
+CVE-2022-42191
+ RESERVED
+CVE-2022-42190
+ RESERVED
+CVE-2022-42189
+ RESERVED
+CVE-2022-42188
+ RESERVED
+CVE-2022-42187
+ RESERVED
+CVE-2022-42186
+ RESERVED
+CVE-2022-42185
+ RESERVED
+CVE-2022-42184
+ RESERVED
+CVE-2022-42183
+ RESERVED
+CVE-2022-42182
+ RESERVED
+CVE-2022-42181
+ RESERVED
+CVE-2022-42180
+ RESERVED
+CVE-2022-42179
+ RESERVED
+CVE-2022-42178
+ RESERVED
+CVE-2022-42177
+ RESERVED
+CVE-2022-42176
+ RESERVED
+CVE-2022-42175
+ RESERVED
+CVE-2022-42174
+ RESERVED
+CVE-2022-42173
+ RESERVED
+CVE-2022-42172
+ RESERVED
+CVE-2022-42171
+ RESERVED
+CVE-2022-42170
+ RESERVED
+CVE-2022-42169
+ RESERVED
+CVE-2022-42168
+ RESERVED
+CVE-2022-42167
+ RESERVED
+CVE-2022-42166
+ RESERVED
+CVE-2022-42165
+ RESERVED
+CVE-2022-42164
+ RESERVED
+CVE-2022-42163
+ RESERVED
+CVE-2022-42162
+ RESERVED
+CVE-2022-42161
+ RESERVED
+CVE-2022-42160
+ RESERVED
+CVE-2022-42159
+ RESERVED
+CVE-2022-42158
+ RESERVED
+CVE-2022-42157
+ RESERVED
+CVE-2022-42156
+ RESERVED
+CVE-2022-42155
+ RESERVED
+CVE-2022-42154
+ RESERVED
+CVE-2022-42153
+ RESERVED
+CVE-2022-42152
+ RESERVED
+CVE-2022-42151
+ RESERVED
+CVE-2022-42150
+ RESERVED
+CVE-2022-42149
+ RESERVED
+CVE-2022-42148
+ RESERVED
+CVE-2022-42147
+ RESERVED
+CVE-2022-42146
+ RESERVED
+CVE-2022-42145
+ RESERVED
+CVE-2022-42144
+ RESERVED
+CVE-2022-42143
+ RESERVED
+CVE-2022-42142
+ RESERVED
+CVE-2022-42141
+ RESERVED
+CVE-2022-42140
+ RESERVED
+CVE-2022-42139
+ RESERVED
+CVE-2022-42138
+ RESERVED
+CVE-2022-42137
+ RESERVED
+CVE-2022-42136
+ RESERVED
+CVE-2022-42135
+ RESERVED
+CVE-2022-42134
+ RESERVED
+CVE-2022-42133
+ RESERVED
+CVE-2022-42132
+ RESERVED
+CVE-2022-42131
+ RESERVED
+CVE-2022-42130
+ RESERVED
+CVE-2022-42129
+ RESERVED
+CVE-2022-42128
+ RESERVED
+CVE-2022-42127
+ RESERVED
+CVE-2022-42126
+ RESERVED
+CVE-2022-42125
+ RESERVED
+CVE-2022-42124
+ RESERVED
+CVE-2022-42123
+ RESERVED
+CVE-2022-42122
+ RESERVED
+CVE-2022-42121
+ RESERVED
+CVE-2022-42120
+ RESERVED
+CVE-2022-42119
+ RESERVED
+CVE-2022-42118
+ RESERVED
+CVE-2022-42117
+ RESERVED
+CVE-2022-42116
+ RESERVED
+CVE-2022-42115
+ RESERVED
+CVE-2022-42114
+ RESERVED
+CVE-2022-42113
+ RESERVED
+CVE-2022-42112
+ RESERVED
+CVE-2022-42111
+ RESERVED
+CVE-2022-42110
+ RESERVED
+CVE-2022-42109
+ RESERVED
+CVE-2022-42108
+ RESERVED
+CVE-2022-42107
+ RESERVED
+CVE-2022-42106
+ RESERVED
+CVE-2022-42105
+ RESERVED
+CVE-2022-42104
+ RESERVED
+CVE-2022-42103
+ RESERVED
+CVE-2022-42102
+ RESERVED
+CVE-2022-42101
+ RESERVED
+CVE-2022-42100
+ RESERVED
+CVE-2022-42099
+ RESERVED
+CVE-2022-42098
+ RESERVED
+CVE-2022-42097
+ RESERVED
+CVE-2022-42096
+ RESERVED
+CVE-2022-42095
+ RESERVED
+CVE-2022-42094
+ RESERVED
+CVE-2022-42093
+ RESERVED
+CVE-2022-42092
+ RESERVED
+CVE-2022-42091
+ RESERVED
+CVE-2022-42090
+ RESERVED
+CVE-2022-42089
+ RESERVED
+CVE-2022-42088
+ RESERVED
+CVE-2022-42087
+ RESERVED
+CVE-2022-42086
+ RESERVED
+CVE-2022-42085
+ RESERVED
+CVE-2022-42084
+ RESERVED
+CVE-2022-42083
+ RESERVED
+CVE-2022-42082
+ RESERVED
+CVE-2022-42081
+ RESERVED
+CVE-2022-42080
+ RESERVED
+CVE-2022-42079
+ RESERVED
+CVE-2022-42078
+ RESERVED
+CVE-2022-42077
+ RESERVED
+CVE-2022-42076
+ RESERVED
+CVE-2022-42075
+ RESERVED
+CVE-2022-42074
+ RESERVED
+CVE-2022-42073
+ RESERVED
+CVE-2022-42072
+ RESERVED
+CVE-2022-42071
+ RESERVED
+CVE-2022-42070
+ RESERVED
+CVE-2022-42069
+ RESERVED
+CVE-2022-42068
+ RESERVED
+CVE-2022-42067
+ RESERVED
+CVE-2022-42066
+ RESERVED
+CVE-2022-42065
+ RESERVED
+CVE-2022-42064
+ RESERVED
+CVE-2022-42063
+ RESERVED
+CVE-2022-42062
+ RESERVED
+CVE-2022-42061
+ RESERVED
+CVE-2022-42060
+ RESERVED
+CVE-2022-42059
+ RESERVED
+CVE-2022-42058
+ RESERVED
+CVE-2022-42057
+ RESERVED
+CVE-2022-42056
+ RESERVED
+CVE-2022-42055
+ RESERVED
+CVE-2022-42054
+ RESERVED
+CVE-2022-42053
+ RESERVED
+CVE-2022-42052
+ RESERVED
+CVE-2022-42051
+ RESERVED
+CVE-2022-42050
+ RESERVED
+CVE-2022-42049
+ RESERVED
+CVE-2022-42048
+ RESERVED
+CVE-2022-42047
+ RESERVED
+CVE-2022-42046
+ RESERVED
+CVE-2022-42045
+ RESERVED
+CVE-2022-42044
+ RESERVED
+CVE-2022-42043
+ RESERVED
+CVE-2022-42042
+ RESERVED
+CVE-2022-42041
+ RESERVED
+CVE-2022-42040
+ RESERVED
+CVE-2022-42039
+ RESERVED
+CVE-2022-42038
+ RESERVED
+CVE-2022-42037
+ RESERVED
+CVE-2022-42036
+ RESERVED
+CVE-2022-42035
+ RESERVED
+CVE-2022-42034
+ RESERVED
+CVE-2022-42033
+ RESERVED
+CVE-2022-42032
+ RESERVED
+CVE-2022-42031
+ RESERVED
+CVE-2022-42030
+ RESERVED
+CVE-2022-42029
+ RESERVED
+CVE-2022-42028
+ RESERVED
+CVE-2022-42027
+ RESERVED
+CVE-2022-42026
+ RESERVED
+CVE-2022-42025
+ RESERVED
+CVE-2022-42024
+ RESERVED
+CVE-2022-42023
+ RESERVED
+CVE-2022-42022
+ RESERVED
+CVE-2022-42021
+ RESERVED
+CVE-2022-42020
+ RESERVED
+CVE-2022-42019
+ RESERVED
+CVE-2022-42018
+ RESERVED
+CVE-2022-42017
+ RESERVED
+CVE-2022-42016
+ RESERVED
+CVE-2022-42015
+ RESERVED
+CVE-2022-42014
+ RESERVED
+CVE-2022-42013
+ RESERVED
+CVE-2022-42012
+ RESERVED
+CVE-2022-42011
+ RESERVED
+CVE-2022-42010
+ RESERVED
+CVE-2022-3390
+ RESERVED
CVE-2022-42009
RESERVED
CVE-2022-3389
@@ -2297,8 +2783,8 @@ CVE-2022-41084
RESERVED
CVE-2022-41083
RESERVED
-CVE-2022-41082
- RESERVED
+CVE-2022-41082 (Microsoft Exchange Server Remote Code Execution Vulnerability. ...)
+ TODO: check
CVE-2022-41081
RESERVED
CVE-2022-41080
@@ -2381,8 +2867,8 @@ CVE-2022-41042
RESERVED
CVE-2022-41041
RESERVED
-CVE-2022-41040
- RESERVED
+CVE-2022-41040 (Microsoft Exchange Server Elevation of Privilege Vulnerability. ...)
+ TODO: check
CVE-2022-41039
RESERVED
CVE-2022-41038
@@ -2728,8 +3214,8 @@ CVE-2022-40888
RESERVED
CVE-2022-40887 (SourceCodester Best Student Result Management System 1.0 is vulnerable ...)
NOT-FOR-US: SourceCodester Best Student Result Management System
-CVE-2022-40886
- RESERVED
+CVE-2022-40886 (DedeCMS 5.7.98 has a file upload vulnerability in the background. ...)
+ TODO: check
CVE-2022-40885
RESERVED
CVE-2022-40884
@@ -7872,6 +8358,7 @@ CVE-2022-38752 (Using snakeYAML to parse untrusted YAML files may be vulnerable
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081 (not public)
NOTE: Deemed a false positive by upstream, only added a test
CVE-2022-38751 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...)
+ {DLA-3132-1}
- snakeyaml 1.31-1
[bullseye] - snakeyaml <no-dsa> (Minor issue)
NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039
@@ -7879,12 +8366,14 @@ CVE-2022-38751 (Using snakeYAML to parse untrusted YAML files may be vulnerable
NOTE: Fixed by https://bitbucket.org/snakeyaml/snakeyaml/commits/f3ab4e0f54c37ddb10f00b71d04187bb0ef1799c
NOTE: Fixed by https://bitbucket.org/snakeyaml/snakeyaml/commits/6aedd33a811f7347c5dae2940e75940966f59466
CVE-2022-38750 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...)
+ {DLA-3132-1}
- snakeyaml 1.31-1
[bullseye] - snakeyaml <no-dsa> (Minor issue)
NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027
NOTE: Test case: https://bitbucket.org/snakeyaml/snakeyaml/commits/a8a072311547574274036f4a1b91a751b397a055
CVE-2022-38749 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...)
+ {DLA-3132-1}
- snakeyaml 1.31-1
[bullseye] - snakeyaml <no-dsa> (Minor issue)
NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/525/got-stackoverflowerror-for-many-open
@@ -10691,7 +11180,7 @@ CVE-2022-37799 (Tenda AC1206 V15.03.06.23 was discovered to contain a stack over
CVE-2022-37798 (Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow v ...)
NOT-FOR-US: Tenda
CVE-2022-37797 (In lighttpd 1.4.65, mod_wstunnel does not initialize a handler functio ...)
- {DSA-5243-1}
+ {DSA-5243-1 DLA-3133-1}
- lighttpd 1.4.66-1
[buster] - lighttpd 1.4.53-1+deb10u3
NOTE: https://redmine.lighttpd.net/issues/3165
@@ -43851,6 +44340,7 @@ CVE-2022-25858 (The package terser before 4.8.1, from 5.0.0 and before 5.14.2 ar
NOTE: https://github.com/terser/terser/commit/a4da7349fdc92c05094f41d33d06d8cd4e90e76b (v5.14.2)
NOTE: https://github.com/terser/terser/commit/d8cc5691be980d663c29cc4d5ce67e852d597012 (v4.8.1)
CVE-2022-25857 (The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable t ...)
+ {DLA-3132-1}
- snakeyaml 1.31-1 (bug #1019218)
[bullseye] - snakeyaml <no-dsa> (Minor issue)
NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/525
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/563ac9f85ca83abca0d22b0c12bc610975c4ea78
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/563ac9f85ca83abca0d22b0c12bc610975c4ea78
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221003/e89c2491/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list