[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Oct 27 21:10:35 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
42fcc87f by security tracker role at 2022-10-27T20:10:24+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,1279 @@
+CVE-2023-20601
+	RESERVED
+CVE-2023-20600
+	RESERVED
+CVE-2023-20599
+	RESERVED
+CVE-2023-20598
+	RESERVED
+CVE-2023-20597
+	RESERVED
+CVE-2023-20596
+	RESERVED
+CVE-2023-20595
+	RESERVED
+CVE-2023-20594
+	RESERVED
+CVE-2023-20593
+	RESERVED
+CVE-2023-20592
+	RESERVED
+CVE-2023-20591
+	RESERVED
+CVE-2023-20590
+	RESERVED
+CVE-2023-20589
+	RESERVED
+CVE-2023-20588
+	RESERVED
+CVE-2023-20587
+	RESERVED
+CVE-2023-20586
+	RESERVED
+CVE-2023-20585
+	RESERVED
+CVE-2023-20584
+	RESERVED
+CVE-2023-20583
+	RESERVED
+CVE-2023-20582
+	RESERVED
+CVE-2023-20581
+	RESERVED
+CVE-2023-20580
+	RESERVED
+CVE-2023-20579
+	RESERVED
+CVE-2023-20578
+	RESERVED
+CVE-2023-20577
+	RESERVED
+CVE-2023-20576
+	RESERVED
+CVE-2023-20575
+	RESERVED
+CVE-2023-20574
+	RESERVED
+CVE-2023-20573
+	RESERVED
+CVE-2023-20572
+	RESERVED
+CVE-2023-20571
+	RESERVED
+CVE-2023-20570
+	RESERVED
+CVE-2023-20569
+	RESERVED
+CVE-2023-20568
+	RESERVED
+CVE-2023-20567
+	RESERVED
+CVE-2023-20566
+	RESERVED
+CVE-2023-20565
+	RESERVED
+CVE-2023-20564
+	RESERVED
+CVE-2023-20563
+	RESERVED
+CVE-2023-20562
+	RESERVED
+CVE-2023-20561
+	RESERVED
+CVE-2023-20560
+	RESERVED
+CVE-2023-20559
+	RESERVED
+CVE-2023-20558
+	RESERVED
+CVE-2023-20557
+	RESERVED
+CVE-2023-20556
+	RESERVED
+CVE-2023-20555
+	RESERVED
+CVE-2023-20554
+	RESERVED
+CVE-2023-20553
+	RESERVED
+CVE-2023-20552
+	RESERVED
+CVE-2023-20551
+	RESERVED
+CVE-2023-20550
+	RESERVED
+CVE-2023-20549
+	RESERVED
+CVE-2023-20548
+	RESERVED
+CVE-2023-20547
+	RESERVED
+CVE-2023-20546
+	RESERVED
+CVE-2023-20545
+	RESERVED
+CVE-2023-20544
+	RESERVED
+CVE-2023-20543
+	RESERVED
+CVE-2023-20542
+	RESERVED
+CVE-2023-20541
+	RESERVED
+CVE-2023-20540
+	RESERVED
+CVE-2023-20539
+	RESERVED
+CVE-2023-20538
+	RESERVED
+CVE-2023-20537
+	RESERVED
+CVE-2023-20536
+	RESERVED
+CVE-2023-20535
+	RESERVED
+CVE-2023-20534
+	RESERVED
+CVE-2023-20533
+	RESERVED
+CVE-2023-20532
+	RESERVED
+CVE-2023-20531
+	RESERVED
+CVE-2023-20530
+	RESERVED
+CVE-2023-20529
+	RESERVED
+CVE-2023-20528
+	RESERVED
+CVE-2023-20527
+	RESERVED
+CVE-2023-20526
+	RESERVED
+CVE-2023-20525
+	RESERVED
+CVE-2023-20524
+	RESERVED
+CVE-2023-20523
+	RESERVED
+CVE-2023-20522
+	RESERVED
+CVE-2023-20521
+	RESERVED
+CVE-2023-20520
+	RESERVED
+CVE-2023-20519
+	RESERVED
+CVE-2023-20518
+	RESERVED
+CVE-2023-20517
+	RESERVED
+CVE-2023-20516
+	RESERVED
+CVE-2023-20515
+	RESERVED
+CVE-2023-20514
+	RESERVED
+CVE-2023-20513
+	RESERVED
+CVE-2023-20512
+	RESERVED
+CVE-2023-20511
+	RESERVED
+CVE-2023-20510
+	RESERVED
+CVE-2023-20509
+	RESERVED
+CVE-2023-20508
+	RESERVED
+CVE-2023-20507
+	RESERVED
+CVE-2023-20506
+	RESERVED
+CVE-2023-20505
+	RESERVED
+CVE-2023-20504
+	RESERVED
+CVE-2023-20503
+	RESERVED
+CVE-2023-20502
+	RESERVED
+CVE-2023-20501
+	RESERVED
+CVE-2023-20500
+	RESERVED
+CVE-2023-20499
+	RESERVED
+CVE-2023-20498
+	RESERVED
+CVE-2023-20497
+	RESERVED
+CVE-2023-20496
+	RESERVED
+CVE-2023-20495
+	RESERVED
+CVE-2023-20494
+	RESERVED
+CVE-2023-20493
+	RESERVED
+CVE-2023-20492
+	RESERVED
+CVE-2023-20491
+	RESERVED
+CVE-2023-20490
+	RESERVED
+CVE-2023-20489
+	RESERVED
+CVE-2023-20488
+	RESERVED
+CVE-2023-20487
+	RESERVED
+CVE-2023-20486
+	RESERVED
+CVE-2023-20485
+	RESERVED
+CVE-2023-20484
+	RESERVED
+CVE-2023-20483
+	RESERVED
+CVE-2023-20482
+	RESERVED
+CVE-2023-20481
+	RESERVED
+CVE-2023-20480
+	RESERVED
+CVE-2023-20479
+	RESERVED
+CVE-2023-20478
+	RESERVED
+CVE-2023-20477
+	RESERVED
+CVE-2023-20476
+	RESERVED
+CVE-2023-20475
+	RESERVED
+CVE-2023-20474
+	RESERVED
+CVE-2023-20473
+	RESERVED
+CVE-2023-20472
+	RESERVED
+CVE-2023-20471
+	RESERVED
+CVE-2023-20470
+	RESERVED
+CVE-2023-20469
+	RESERVED
+CVE-2023-20468
+	RESERVED
+CVE-2023-20467
+	RESERVED
+CVE-2023-20466
+	RESERVED
+CVE-2023-20465
+	RESERVED
+CVE-2023-20464
+	RESERVED
+CVE-2023-20463
+	RESERVED
+CVE-2023-20462
+	RESERVED
+CVE-2023-20461
+	RESERVED
+CVE-2023-20460
+	RESERVED
+CVE-2023-20459
+	RESERVED
+CVE-2023-20458
+	RESERVED
+CVE-2023-20457
+	RESERVED
+CVE-2023-20456
+	RESERVED
+CVE-2023-20455
+	RESERVED
+CVE-2023-20454
+	RESERVED
+CVE-2023-20453
+	RESERVED
+CVE-2023-20452
+	RESERVED
+CVE-2023-20451
+	RESERVED
+CVE-2023-20450
+	RESERVED
+CVE-2023-20449
+	RESERVED
+CVE-2023-20448
+	RESERVED
+CVE-2023-20447
+	RESERVED
+CVE-2023-20446
+	RESERVED
+CVE-2023-20445
+	RESERVED
+CVE-2023-20444
+	RESERVED
+CVE-2023-20443
+	RESERVED
+CVE-2023-20442
+	RESERVED
+CVE-2023-20441
+	RESERVED
+CVE-2023-20440
+	RESERVED
+CVE-2023-20439
+	RESERVED
+CVE-2023-20438
+	RESERVED
+CVE-2023-20437
+	RESERVED
+CVE-2023-20436
+	RESERVED
+CVE-2023-20435
+	RESERVED
+CVE-2023-20434
+	RESERVED
+CVE-2023-20433
+	RESERVED
+CVE-2023-20432
+	RESERVED
+CVE-2023-20431
+	RESERVED
+CVE-2023-20430
+	RESERVED
+CVE-2023-20429
+	RESERVED
+CVE-2023-20428
+	RESERVED
+CVE-2023-20427
+	RESERVED
+CVE-2023-20426
+	RESERVED
+CVE-2023-20425
+	RESERVED
+CVE-2023-20424
+	RESERVED
+CVE-2023-20423
+	RESERVED
+CVE-2023-20422
+	RESERVED
+CVE-2023-20421
+	RESERVED
+CVE-2023-20420
+	RESERVED
+CVE-2023-20419
+	RESERVED
+CVE-2023-20418
+	RESERVED
+CVE-2023-20417
+	RESERVED
+CVE-2023-20416
+	RESERVED
+CVE-2023-20415
+	RESERVED
+CVE-2023-20414
+	RESERVED
+CVE-2023-20413
+	RESERVED
+CVE-2023-20412
+	RESERVED
+CVE-2023-20411
+	RESERVED
+CVE-2023-20410
+	RESERVED
+CVE-2023-20409
+	RESERVED
+CVE-2023-20408
+	RESERVED
+CVE-2023-20407
+	RESERVED
+CVE-2023-20406
+	RESERVED
+CVE-2023-20405
+	RESERVED
+CVE-2023-20404
+	RESERVED
+CVE-2023-20403
+	RESERVED
+CVE-2023-20402
+	RESERVED
+CVE-2023-20401
+	RESERVED
+CVE-2023-20400
+	RESERVED
+CVE-2023-20399
+	RESERVED
+CVE-2023-20398
+	RESERVED
+CVE-2023-20397
+	RESERVED
+CVE-2023-20396
+	RESERVED
+CVE-2023-20395
+	RESERVED
+CVE-2023-20394
+	RESERVED
+CVE-2023-20393
+	RESERVED
+CVE-2023-20392
+	RESERVED
+CVE-2023-20391
+	RESERVED
+CVE-2023-20390
+	RESERVED
+CVE-2023-20389
+	RESERVED
+CVE-2023-20388
+	RESERVED
+CVE-2023-20387
+	RESERVED
+CVE-2023-20386
+	RESERVED
+CVE-2023-20385
+	RESERVED
+CVE-2023-20384
+	RESERVED
+CVE-2023-20383
+	RESERVED
+CVE-2023-20382
+	RESERVED
+CVE-2023-20381
+	RESERVED
+CVE-2023-20380
+	RESERVED
+CVE-2023-20379
+	RESERVED
+CVE-2023-20378
+	RESERVED
+CVE-2023-20377
+	RESERVED
+CVE-2023-20376
+	RESERVED
+CVE-2023-20375
+	RESERVED
+CVE-2023-20374
+	RESERVED
+CVE-2023-20373
+	RESERVED
+CVE-2023-20372
+	RESERVED
+CVE-2023-20371
+	RESERVED
+CVE-2023-20370
+	RESERVED
+CVE-2023-20369
+	RESERVED
+CVE-2023-20368
+	RESERVED
+CVE-2023-20367
+	RESERVED
+CVE-2023-20366
+	RESERVED
+CVE-2023-20365
+	RESERVED
+CVE-2023-20364
+	RESERVED
+CVE-2023-20363
+	RESERVED
+CVE-2023-20362
+	RESERVED
+CVE-2023-20361
+	RESERVED
+CVE-2023-20360
+	RESERVED
+CVE-2023-20359
+	RESERVED
+CVE-2023-20358
+	RESERVED
+CVE-2023-20357
+	RESERVED
+CVE-2023-20356
+	RESERVED
+CVE-2023-20355
+	RESERVED
+CVE-2023-20354
+	RESERVED
+CVE-2023-20353
+	RESERVED
+CVE-2023-20352
+	RESERVED
+CVE-2023-20351
+	RESERVED
+CVE-2023-20350
+	RESERVED
+CVE-2023-20349
+	RESERVED
+CVE-2023-20348
+	RESERVED
+CVE-2023-20347
+	RESERVED
+CVE-2023-20346
+	RESERVED
+CVE-2023-20345
+	RESERVED
+CVE-2023-20344
+	RESERVED
+CVE-2023-20343
+	RESERVED
+CVE-2023-20342
+	RESERVED
+CVE-2023-20341
+	RESERVED
+CVE-2023-20340
+	RESERVED
+CVE-2023-20339
+	RESERVED
+CVE-2023-20338
+	RESERVED
+CVE-2023-20337
+	RESERVED
+CVE-2023-20336
+	RESERVED
+CVE-2023-20335
+	RESERVED
+CVE-2023-20334
+	RESERVED
+CVE-2023-20333
+	RESERVED
+CVE-2023-20332
+	RESERVED
+CVE-2023-20331
+	RESERVED
+CVE-2023-20330
+	RESERVED
+CVE-2023-20329
+	RESERVED
+CVE-2023-20328
+	RESERVED
+CVE-2023-20327
+	RESERVED
+CVE-2023-20326
+	RESERVED
+CVE-2023-20325
+	RESERVED
+CVE-2023-20324
+	RESERVED
+CVE-2023-20323
+	RESERVED
+CVE-2023-20322
+	RESERVED
+CVE-2023-20321
+	RESERVED
+CVE-2023-20320
+	RESERVED
+CVE-2023-20319
+	RESERVED
+CVE-2023-20318
+	RESERVED
+CVE-2023-20317
+	RESERVED
+CVE-2023-20316
+	RESERVED
+CVE-2023-20315
+	RESERVED
+CVE-2023-20314
+	RESERVED
+CVE-2023-20313
+	RESERVED
+CVE-2023-20312
+	RESERVED
+CVE-2023-20311
+	RESERVED
+CVE-2023-20310
+	RESERVED
+CVE-2023-20309
+	RESERVED
+CVE-2023-20308
+	RESERVED
+CVE-2023-20307
+	RESERVED
+CVE-2023-20306
+	RESERVED
+CVE-2023-20305
+	RESERVED
+CVE-2023-20304
+	RESERVED
+CVE-2023-20303
+	RESERVED
+CVE-2023-20302
+	RESERVED
+CVE-2023-20301
+	RESERVED
+CVE-2023-20300
+	RESERVED
+CVE-2023-20299
+	RESERVED
+CVE-2023-20298
+	RESERVED
+CVE-2023-20297
+	RESERVED
+CVE-2023-20296
+	RESERVED
+CVE-2023-20295
+	RESERVED
+CVE-2023-20294
+	RESERVED
+CVE-2023-20293
+	RESERVED
+CVE-2023-20292
+	RESERVED
+CVE-2023-20291
+	RESERVED
+CVE-2023-20290
+	RESERVED
+CVE-2023-20289
+	RESERVED
+CVE-2023-20288
+	RESERVED
+CVE-2023-20287
+	RESERVED
+CVE-2023-20286
+	RESERVED
+CVE-2023-20285
+	RESERVED
+CVE-2023-20284
+	RESERVED
+CVE-2023-20283
+	RESERVED
+CVE-2023-20282
+	RESERVED
+CVE-2023-20281
+	RESERVED
+CVE-2023-20280
+	RESERVED
+CVE-2023-20279
+	RESERVED
+CVE-2023-20278
+	RESERVED
+CVE-2023-20277
+	RESERVED
+CVE-2023-20276
+	RESERVED
+CVE-2023-20275
+	RESERVED
+CVE-2023-20274
+	RESERVED
+CVE-2023-20273
+	RESERVED
+CVE-2023-20272
+	RESERVED
+CVE-2023-20271
+	RESERVED
+CVE-2023-20270
+	RESERVED
+CVE-2023-20269
+	RESERVED
+CVE-2023-20268
+	RESERVED
+CVE-2023-20267
+	RESERVED
+CVE-2023-20266
+	RESERVED
+CVE-2023-20265
+	RESERVED
+CVE-2023-20264
+	RESERVED
+CVE-2023-20263
+	RESERVED
+CVE-2023-20262
+	RESERVED
+CVE-2023-20261
+	RESERVED
+CVE-2023-20260
+	RESERVED
+CVE-2023-20259
+	RESERVED
+CVE-2023-20258
+	RESERVED
+CVE-2023-20257
+	RESERVED
+CVE-2023-20256
+	RESERVED
+CVE-2023-20255
+	RESERVED
+CVE-2023-20254
+	RESERVED
+CVE-2023-20253
+	RESERVED
+CVE-2023-20252
+	RESERVED
+CVE-2023-20251
+	RESERVED
+CVE-2023-20250
+	RESERVED
+CVE-2023-20249
+	RESERVED
+CVE-2023-20248
+	RESERVED
+CVE-2023-20247
+	RESERVED
+CVE-2023-20246
+	RESERVED
+CVE-2023-20245
+	RESERVED
+CVE-2023-20244
+	RESERVED
+CVE-2023-20243
+	RESERVED
+CVE-2023-20242
+	RESERVED
+CVE-2023-20241
+	RESERVED
+CVE-2023-20240
+	RESERVED
+CVE-2023-20239
+	RESERVED
+CVE-2023-20238
+	RESERVED
+CVE-2023-20237
+	RESERVED
+CVE-2023-20236
+	RESERVED
+CVE-2023-20235
+	RESERVED
+CVE-2023-20234
+	RESERVED
+CVE-2023-20233
+	RESERVED
+CVE-2023-20232
+	RESERVED
+CVE-2023-20231
+	RESERVED
+CVE-2023-20230
+	RESERVED
+CVE-2023-20229
+	RESERVED
+CVE-2023-20228
+	RESERVED
+CVE-2023-20227
+	RESERVED
+CVE-2023-20226
+	RESERVED
+CVE-2023-20225
+	RESERVED
+CVE-2023-20224
+	RESERVED
+CVE-2023-20223
+	RESERVED
+CVE-2023-20222
+	RESERVED
+CVE-2023-20221
+	RESERVED
+CVE-2023-20220
+	RESERVED
+CVE-2023-20219
+	RESERVED
+CVE-2023-20218
+	RESERVED
+CVE-2023-20217
+	RESERVED
+CVE-2023-20216
+	RESERVED
+CVE-2023-20215
+	RESERVED
+CVE-2023-20214
+	RESERVED
+CVE-2023-20213
+	RESERVED
+CVE-2023-20212
+	RESERVED
+CVE-2023-20211
+	RESERVED
+CVE-2023-20210
+	RESERVED
+CVE-2023-20209
+	RESERVED
+CVE-2023-20208
+	RESERVED
+CVE-2023-20207
+	RESERVED
+CVE-2023-20206
+	RESERVED
+CVE-2023-20205
+	RESERVED
+CVE-2023-20204
+	RESERVED
+CVE-2023-20203
+	RESERVED
+CVE-2023-20202
+	RESERVED
+CVE-2023-20201
+	RESERVED
+CVE-2023-20200
+	RESERVED
+CVE-2023-20199
+	RESERVED
+CVE-2023-20198
+	RESERVED
+CVE-2023-20197
+	RESERVED
+CVE-2023-20196
+	RESERVED
+CVE-2023-20195
+	RESERVED
+CVE-2023-20194
+	RESERVED
+CVE-2023-20193
+	RESERVED
+CVE-2023-20192
+	RESERVED
+CVE-2023-20191
+	RESERVED
+CVE-2023-20190
+	RESERVED
+CVE-2023-20189
+	RESERVED
+CVE-2023-20188
+	RESERVED
+CVE-2023-20187
+	RESERVED
+CVE-2023-20186
+	RESERVED
+CVE-2023-20185
+	RESERVED
+CVE-2023-20184
+	RESERVED
+CVE-2023-20183
+	RESERVED
+CVE-2023-20182
+	RESERVED
+CVE-2023-20181
+	RESERVED
+CVE-2023-20180
+	RESERVED
+CVE-2023-20179
+	RESERVED
+CVE-2023-20178
+	RESERVED
+CVE-2023-20177
+	RESERVED
+CVE-2023-20176
+	RESERVED
+CVE-2023-20175
+	RESERVED
+CVE-2023-20174
+	RESERVED
+CVE-2023-20173
+	RESERVED
+CVE-2023-20172
+	RESERVED
+CVE-2023-20171
+	RESERVED
+CVE-2023-20170
+	RESERVED
+CVE-2023-20169
+	RESERVED
+CVE-2023-20168
+	RESERVED
+CVE-2023-20167
+	RESERVED
+CVE-2023-20166
+	RESERVED
+CVE-2023-20165
+	RESERVED
+CVE-2023-20164
+	RESERVED
+CVE-2023-20163
+	RESERVED
+CVE-2023-20162
+	RESERVED
+CVE-2023-20161
+	RESERVED
+CVE-2023-20160
+	RESERVED
+CVE-2023-20159
+	RESERVED
+CVE-2023-20158
+	RESERVED
+CVE-2023-20157
+	RESERVED
+CVE-2023-20156
+	RESERVED
+CVE-2023-20155
+	RESERVED
+CVE-2023-20154
+	RESERVED
+CVE-2023-20153
+	RESERVED
+CVE-2023-20152
+	RESERVED
+CVE-2023-20151
+	RESERVED
+CVE-2023-20150
+	RESERVED
+CVE-2023-20149
+	RESERVED
+CVE-2023-20148
+	RESERVED
+CVE-2023-20147
+	RESERVED
+CVE-2023-20146
+	RESERVED
+CVE-2023-20145
+	RESERVED
+CVE-2023-20144
+	RESERVED
+CVE-2023-20143
+	RESERVED
+CVE-2023-20142
+	RESERVED
+CVE-2023-20141
+	RESERVED
+CVE-2023-20140
+	RESERVED
+CVE-2023-20139
+	RESERVED
+CVE-2023-20138
+	RESERVED
+CVE-2023-20137
+	RESERVED
+CVE-2023-20136
+	RESERVED
+CVE-2023-20135
+	RESERVED
+CVE-2023-20134
+	RESERVED
+CVE-2023-20133
+	RESERVED
+CVE-2023-20132
+	RESERVED
+CVE-2023-20131
+	RESERVED
+CVE-2023-20130
+	RESERVED
+CVE-2023-20129
+	RESERVED
+CVE-2023-20128
+	RESERVED
+CVE-2023-20127
+	RESERVED
+CVE-2023-20126
+	RESERVED
+CVE-2023-20125
+	RESERVED
+CVE-2023-20124
+	RESERVED
+CVE-2023-20123
+	RESERVED
+CVE-2023-20122
+	RESERVED
+CVE-2023-20121
+	RESERVED
+CVE-2023-20120
+	RESERVED
+CVE-2023-20119
+	RESERVED
+CVE-2023-20118
+	RESERVED
+CVE-2023-20117
+	RESERVED
+CVE-2023-20116
+	RESERVED
+CVE-2023-20115
+	RESERVED
+CVE-2023-20114
+	RESERVED
+CVE-2023-20113
+	RESERVED
+CVE-2023-20112
+	RESERVED
+CVE-2023-20111
+	RESERVED
+CVE-2023-20110
+	RESERVED
+CVE-2023-20109
+	RESERVED
+CVE-2023-20108
+	RESERVED
+CVE-2023-20107
+	RESERVED
+CVE-2023-20106
+	RESERVED
+CVE-2023-20105
+	RESERVED
+CVE-2023-20104
+	RESERVED
+CVE-2023-20103
+	RESERVED
+CVE-2023-20102
+	RESERVED
+CVE-2023-20101
+	RESERVED
+CVE-2023-20100
+	RESERVED
+CVE-2023-20099
+	RESERVED
+CVE-2023-20098
+	RESERVED
+CVE-2023-20097
+	RESERVED
+CVE-2023-20096
+	RESERVED
+CVE-2023-20095
+	RESERVED
+CVE-2023-20094
+	RESERVED
+CVE-2023-20093
+	RESERVED
+CVE-2023-20092
+	RESERVED
+CVE-2023-20091
+	RESERVED
+CVE-2023-20090
+	RESERVED
+CVE-2023-20089
+	RESERVED
+CVE-2023-20088
+	RESERVED
+CVE-2023-20087
+	RESERVED
+CVE-2023-20086
+	RESERVED
+CVE-2023-20085
+	RESERVED
+CVE-2023-20084
+	RESERVED
+CVE-2023-20083
+	RESERVED
+CVE-2023-20082
+	RESERVED
+CVE-2023-20081
+	RESERVED
+CVE-2023-20080
+	RESERVED
+CVE-2023-20079
+	RESERVED
+CVE-2023-20078
+	RESERVED
+CVE-2023-20077
+	RESERVED
+CVE-2023-20076
+	RESERVED
+CVE-2023-20075
+	RESERVED
+CVE-2023-20074
+	RESERVED
+CVE-2023-20073
+	RESERVED
+CVE-2023-20072
+	RESERVED
+CVE-2023-20071
+	RESERVED
+CVE-2023-20070
+	RESERVED
+CVE-2023-20069
+	RESERVED
+CVE-2023-20068
+	RESERVED
+CVE-2023-20067
+	RESERVED
+CVE-2023-20066
+	RESERVED
+CVE-2023-20065
+	RESERVED
+CVE-2023-20064
+	RESERVED
+CVE-2023-20063
+	RESERVED
+CVE-2023-20062
+	RESERVED
+CVE-2023-20061
+	RESERVED
+CVE-2023-20060
+	RESERVED
+CVE-2023-20059
+	RESERVED
+CVE-2023-20058
+	RESERVED
+CVE-2023-20057
+	RESERVED
+CVE-2023-20056
+	RESERVED
+CVE-2023-20055
+	RESERVED
+CVE-2023-20054
+	RESERVED
+CVE-2023-20053
+	RESERVED
+CVE-2023-20052
+	RESERVED
+CVE-2023-20051
+	RESERVED
+CVE-2023-20050
+	RESERVED
+CVE-2023-20049
+	RESERVED
+CVE-2023-20048
+	RESERVED
+CVE-2023-20047
+	RESERVED
+CVE-2023-20046
+	RESERVED
+CVE-2023-20045
+	RESERVED
+CVE-2023-20044
+	RESERVED
+CVE-2023-20043
+	RESERVED
+CVE-2023-20042
+	RESERVED
+CVE-2023-20041
+	RESERVED
+CVE-2023-20040
+	RESERVED
+CVE-2023-20039
+	RESERVED
+CVE-2023-20038
+	RESERVED
+CVE-2023-20037
+	RESERVED
+CVE-2023-20036
+	RESERVED
+CVE-2023-20035
+	RESERVED
+CVE-2023-20034
+	RESERVED
+CVE-2023-20033
+	RESERVED
+CVE-2023-20032
+	RESERVED
+CVE-2023-20031
+	RESERVED
+CVE-2023-20030
+	RESERVED
+CVE-2023-20029
+	RESERVED
+CVE-2023-20028
+	RESERVED
+CVE-2023-20027
+	RESERVED
+CVE-2023-20026
+	RESERVED
+CVE-2023-20025
+	RESERVED
+CVE-2023-20024
+	RESERVED
+CVE-2023-20023
+	RESERVED
+CVE-2023-20022
+	RESERVED
+CVE-2023-20021
+	RESERVED
+CVE-2023-20020
+	RESERVED
+CVE-2023-20019
+	RESERVED
+CVE-2023-20018
+	RESERVED
+CVE-2023-20017
+	RESERVED
+CVE-2023-20016
+	RESERVED
+CVE-2023-20015
+	RESERVED
+CVE-2023-20014
+	RESERVED
+CVE-2023-20013
+	RESERVED
+CVE-2023-20012
+	RESERVED
+CVE-2023-20011
+	RESERVED
+CVE-2023-20010
+	RESERVED
+CVE-2023-20009
+	RESERVED
+CVE-2023-20008
+	RESERVED
+CVE-2023-20007
+	RESERVED
+CVE-2023-20006
+	RESERVED
+CVE-2023-20005
+	RESERVED
+CVE-2023-20004
+	RESERVED
+CVE-2023-20003
+	RESERVED
+CVE-2023-20002
+	RESERVED
+CVE-2023-20001
+	RESERVED
+CVE-2023-0010
+	RESERVED
+CVE-2023-0009
+	RESERVED
+CVE-2023-0008
+	RESERVED
+CVE-2023-0007
+	RESERVED
+CVE-2023-0006
+	RESERVED
+CVE-2023-0005
+	RESERVED
+CVE-2023-0004
+	RESERVED
+CVE-2023-0003
+	RESERVED
+CVE-2023-0002
+	RESERVED
+CVE-2023-0001
+	RESERVED
+CVE-2022-43958
+	RESERVED
+CVE-2022-43957
+	RESERVED
+CVE-2022-43956
+	RESERVED
+CVE-2022-43955
+	RESERVED
+CVE-2022-43954
+	RESERVED
+CVE-2022-43953
+	RESERVED
+CVE-2022-43952
+	RESERVED
+CVE-2022-43951
+	RESERVED
+CVE-2022-43950
+	RESERVED
+CVE-2022-43949
+	RESERVED
+CVE-2022-43948
+	RESERVED
+CVE-2022-43947
+	RESERVED
+CVE-2022-43946
+	RESERVED
+CVE-2022-3727
+	RESERVED
+CVE-2022-3726
+	RESERVED
+CVE-2022-3725 (Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allow ...)
+	TODO: check
+CVE-2022-3724
+	RESERVED
+CVE-2022-3723
+	RESERVED
+CVE-2022-3722
+	RESERVED
+CVE-2022-3721
+	RESERVED
+CVE-2022-3720
+	RESERVED
+CVE-2022-3719 (A vulnerability has been found in Exiv2 and classified as critical. Th ...)
+	TODO: check
+CVE-2022-3718 (A vulnerability, which was classified as problematic, was found in Exi ...)
+	TODO: check
+CVE-2022-3717 (A vulnerability, which was classified as critical, has been found in E ...)
+	TODO: check
+CVE-2022-3716 (A vulnerability classified as problematic was found in SourceCodester  ...)
+	TODO: check
+CVE-2022-3715
+	RESERVED
+CVE-2022-3714 (A vulnerability classified as critical has been found in SourceCodeste ...)
+	TODO: check
 CVE-2022-43945
 	RESERVED
 CVE-2022-43944
@@ -1134,8 +2410,8 @@ CVE-2022-42460
 	RESERVED
 CVE-2022-42459
 	RESERVED
-CVE-2022-41996
-	RESERVED
+CVE-2022-41996 (Cross-Site Request Forgery (CSRF) vulnerability in ThemeFusion Avada p ...)
+	TODO: check
 CVE-2022-41995
 	RESERVED
 CVE-2022-41992
@@ -1586,14 +2862,14 @@ CVE-2022-43369
 	RESERVED
 CVE-2022-43368
 	RESERVED
-CVE-2022-43367
-	RESERVED
-CVE-2022-43366
-	RESERVED
-CVE-2022-43365
-	RESERVED
-CVE-2022-43364
-	RESERVED
+CVE-2022-43367 (IP-COM EW9 V15.11.0.14(9732) was discovered to contain a command injec ...)
+	TODO: check
+CVE-2022-43366 (IP-COM EW9 V15.11.0.14(9732) allows unauthenticated attackers to acces ...)
+	TODO: check
+CVE-2022-43365 (IP-COM EW9 V15.11.0.14(9732) was discovered to contain a buffer overfl ...)
+	TODO: check
+CVE-2022-43364 (An access control issue in the password reset page of IP-COM EW9 V15.1 ...)
+	TODO: check
 CVE-2022-43363
 	RESERVED
 CVE-2022-43362
@@ -1640,8 +2916,8 @@ CVE-2022-43342
 	RESERVED
 CVE-2022-43341
 	RESERVED
-CVE-2022-43340
-	RESERVED
+CVE-2022-43340 (A Cross-Site Request Forgery (CSRF) in dzzoffice 2.02.1_SC_UTF8 allows ...)
+	TODO: check
 CVE-2022-43339
 	RESERVED
 CVE-2022-43338
@@ -2354,12 +3630,12 @@ CVE-2022-42995
 	RESERVED
 CVE-2022-42994
 	RESERVED
-CVE-2022-42993
-	RESERVED
-CVE-2022-42992
-	RESERVED
-CVE-2022-42991
-	RESERVED
+CVE-2022-42993 (Password Storage Application v1.0 was discovered to contain a cross-si ...)
+	TODO: check
+CVE-2022-42992 (Multiple stored cross-site scripting (XSS) vulnerabilities in Train Sc ...)
+	TODO: check
+CVE-2022-42991 (A stored cross-site scripting (XSS) vulnerability in Simple Online Pub ...)
+	TODO: check
 CVE-2022-42990
 	RESERVED
 CVE-2022-42989
@@ -3922,8 +5198,8 @@ CVE-2022-3411
 	RESERVED
 CVE-2022-3410
 	RESERVED
-CVE-2022-3409
-	RESERVED
+CVE-2022-3409 (A vulnerability in bmcweb of OpenBMC Project allows user to cause deni ...)
+	TODO: check
 CVE-2022-3408
 	RESERVED
 CVE-2022-3407
@@ -4762,10 +6038,10 @@ CVE-2022-42057
 	RESERVED
 CVE-2022-42056
 	RESERVED
-CVE-2022-42055
-	RESERVED
-CVE-2022-42054
-	RESERVED
+CVE-2022-42055 (Multiple command injection vulnerabilities in GL.iNet GoodCloud IoT De ...)
+	TODO: check
+CVE-2022-42054 (Multiple stored cross-site scripting (XSS) vulnerabilities in GL.iNet  ...)
+	TODO: check
 CVE-2022-42053
 	RESERVED
 CVE-2022-42052
@@ -7683,10 +8959,10 @@ CVE-2022-40877 (Exam Reviewer Management System 1.0 is vulnerable to SQL Injecti
 	NOT-FOR-US: Exam Reviewer Management System
 CVE-2022-40876
 	RESERVED
-CVE-2022-40875
-	RESERVED
-CVE-2022-40874
-	RESERVED
+CVE-2022-40875 (Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow in the ...)
+	TODO: check
+CVE-2022-40874 (Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow vulner ...)
+	TODO: check
 CVE-2022-40873
 	RESERVED
 CVE-2022-40872 (An SQL injection vulnerability issue was discovered in Sourcecodester  ...)
@@ -9337,10 +10613,10 @@ CVE-2022-40186 (An issue was discovered in HashiCorp Vault and Vault Enterprise
 	NOT-FOR-US: HashiCorp Vault and Vault Enterprise
 CVE-2022-40185
 	RESERVED
-CVE-2022-40184
-	RESERVED
-CVE-2022-40183
-	RESERVED
+CVE-2022-40184 (Incomplete filtering of JavaScript code in different configuration fie ...)
+	TODO: check
+CVE-2022-40183 (An error in the URL handler of the VIDEOJET multi 4000 may lead to a r ...)
+	TODO: check
 CVE-2022-40182 (A vulnerability has been identified in Desigo PXM30-1 (All versions &l ...)
 	NOT-FOR-US: Siemens
 CVE-2022-40181 (A vulnerability has been identified in Desigo PXM30-1 (All versions &l ...)
@@ -11197,10 +12473,10 @@ CVE-2022-39367
 	RESERVED
 CVE-2022-39366
 	RESERVED
-CVE-2022-39365
-	RESERVED
-CVE-2022-39364
-	RESERVED
+CVE-2022-39365 (Pimcore is an open source data and experience management platform. Pri ...)
+	TODO: check
+CVE-2022-39364 (Nextcloud Server is the file server software for Nextcloud, a self-hos ...)
+	TODO: check
 CVE-2022-39363
 	RESERVED
 CVE-2022-39362 (Metabase is data visualization software. Prior to versions 0.44.5, 1.4 ...)
@@ -11267,10 +12543,10 @@ CVE-2022-39332
 	RESERVED
 CVE-2022-39331
 	RESERVED
-CVE-2022-39330
-	RESERVED
-CVE-2022-39329
-	RESERVED
+CVE-2022-39330 (Nextcloud Server is the file server software for Nextcloud, a self-hos ...)
+	TODO: check
+CVE-2022-39329 (Nextcloud Server is the file server software for Nextcloud, a self-hos ...)
+	TODO: check
 CVE-2022-39328
 	RESERVED
 CVE-2022-39327 (Azure CLI is the command-line interface for Microsoft Azure. In versio ...)
@@ -11626,8 +12902,8 @@ CVE-2022-3097 (The LBStopAttack WordPress plugin through 1.1.2 does not use nonc
 	NOT-FOR-US: WordPress plugin
 CVE-2022-3096
 	RESERVED
-CVE-2022-3095
-	RESERVED
+CVE-2022-3095 (The implementation of backslash parsing in the Dart URI class for vers ...)
+	TODO: check
 CVE-2022-3094
 	RESERVED
 CVE-2022-39197 (An XSS (Cross Site Scripting) vulnerability was found in HelpSystems C ...)
@@ -12986,8 +14262,8 @@ CVE-2021-46835 (There is a traffic hijacking vulnerability in WS7200-10 11.0.2.1
 	NOT-FOR-US: Huawei
 CVE-2020-36602 (There is an out-of-bounds read and write vulnerability in some headset ...)
 	NOT-FOR-US: Huawei
-CVE-2022-38744
-	RESERVED
+CVE-2022-38744 (An unauthenticated attacker with network access to a victim's Rockwell ...)
+	TODO: check
 CVE-2022-38743 (Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, ...)
 	NOT-FOR-US: Rockwell Automation
 CVE-2022-38742 (Rockwell Automation ThinManager ThinServer versions 11.0.0 - 13.0.0 is ...)
@@ -14745,8 +16021,8 @@ CVE-2022-38182
 	RESERVED
 CVE-2022-38181 (An Arm product family through 2022-08-12 mail GPU kernel driver allows ...)
 	TODO: check
-CVE-2022-2809
-	RESERVED
+CVE-2022-2809 (A vulnerability in bmcweb of OpenBMC Project allows user to cause deni ...)
+	TODO: check
 CVE-2022-38180 (In JetBrains Ktor before 2.1.0 the wrong authentication provider could ...)
 	NOT-FOR-US: JetBrains Ktor
 CVE-2022-38179 (JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Downloa ...)
@@ -19948,8 +21224,8 @@ CVE-2022-36184
 	RESERVED
 CVE-2022-36183
 	RESERVED
-CVE-2022-36182
-	RESERVED
+CVE-2022-36182 (Hashicorp Boundary v0.8.0 is vulnerable to Clickjacking which allow fo ...)
+	TODO: check
 CVE-2022-36181
 	RESERVED
 CVE-2022-36180
@@ -25260,7 +26536,7 @@ CVE-2022-34267
 CVE-2022-34266 (The libtiff-4.0.3-35.amzn2.0.1 package for LibTIFF on Amazon Linux 2 a ...)
 	NOT-FOR-US: libtiff-4.0.3-35.amzn2.0.1 Amazon package
 CVE-2022-34265 (An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0 ...)
-	{DSA-5254-1}
+	{DSA-5254-1 DLA-3164-1}
 	- python-django 2:4.0.6-1 (bug #1014541)
 	NOTE: https://www.openwall.com/lists/oss-security/2022/07/04/2
 	NOTE: https://www.djangoproject.com/weblog/2022/jul/04/security-releases/
@@ -29892,8 +31168,8 @@ CVE-2022-32409 (A local file inclusion (LFI) vulnerability in the component code
 	NOT-FOR-US: Portal do Software Publico Brasileiro i3geo
 CVE-2022-32408
 	RESERVED
-CVE-2022-32407
-	RESERVED
+CVE-2022-32407 (Softr v2.0 was discovered to contain a Cross-Site Scripting (XSS) vuln ...)
+	TODO: check
 CVE-2022-32406 (GtkRadiant v1.6.6 was discovered to contain a buffer overflow via the  ...)
 	NOT-FOR-US: GtkRadiant
 CVE-2022-32405 (Prison Management System v1.0 was discovered to contain a SQL injectio ...)
@@ -31341,8 +32617,8 @@ CVE-2022-31900
 	RESERVED
 CVE-2022-31899
 	RESERVED
-CVE-2022-31898
-	RESERVED
+CVE-2022-31898 (gl-inet GL-MT300N-V2 Mango v3.212 and GL-AX1800 Flint v3.214 were disc ...)
+	TODO: check
 CVE-2022-31897 (SourceCodester Zoo Management System 1.0 is vulnerable to Cross Site S ...)
 	NOT-FOR-US: SourceCodester Zoo Management System
 CVE-2022-31896
@@ -52881,10 +54157,10 @@ CVE-2022-21168 (The affected product is vulnerable due to an invalid pointer ini
 	NOT-FOR-US: Fuji Electric
 CVE-2022-24671 (A link following privilege escalation vulnerability in Trend Micro Ant ...)
 	NOT-FOR-US: Trend Micro
-CVE-2022-24670
-	RESERVED
-CVE-2022-24669
-	RESERVED
+CVE-2022-24670 (An attacker can use the unrestricted LDAP queries to determine configu ...)
+	TODO: check
+CVE-2022-24669 (It may be possible to gain some details of the deployment through a we ...)
+	TODO: check
 CVE-2022-0547 (OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass  ...)
 	{DLA-2992-1}
 	- openvpn 2.5.6-1 (bug #1008015)
@@ -63440,10 +64716,10 @@ CVE-2021-45478
 	RESERVED
 CVE-2021-45477
 	RESERVED
-CVE-2021-45476
-	RESERVED
-CVE-2021-45475
-	RESERVED
+CVE-2021-45476 (Yordam Library Information Document Automation product before version  ...)
+	TODO: check
+CVE-2021-45475 (Yordam Library Information Document Automation product before version  ...)
+	TODO: check
 CVE-2021-4166 (vim is vulnerable to Out-of-bounds Read ...)
 	- vim 2:8.2.3995-1
 	[bullseye] - vim <no-dsa> (Minor issue)
@@ -118518,7 +119794,7 @@ CVE-2021-3283 (HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java t
 CVE-2021-3282 (HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` ...)
 	NOT-FOR-US: HashiCorp Vault
 CVE-2021-3281 (In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6,  ...)
-	{DLA-2540-1}
+	{DLA-3164-1 DLA-2540-1}
 	- python-django 2:2.2.18-1 (bug #981562)
 	NOTE: https://www.djangoproject.com/weblog/2021/feb/01/security-releases/
 	NOTE: https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23 (master)
@@ -124992,7 +126268,7 @@ CVE-2021-23337 (Lodash versions prior to 4.17.21 are vulnerable to Command Injec
 	[stretch] - node-lodash <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://snyk.io/vuln/SNYK-JS-LODASH-1040724
 CVE-2021-23336 (The package python/cpython from 0 and before 3.6.13, from 3.7.0 and be ...)
-	{DLA-2628-1 DLA-2619-1 DLA-2569-1}
+	{DLA-3164-1 DLA-2628-1 DLA-2619-1 DLA-2569-1}
 	- python-django 2:2.2.19-1 (bug #983090)
 	- python3.9 3.9.2-1
 	[buster] - python3.9 <ignored> (Will break existing applications, don't backport to released suites)
@@ -153880,6 +155156,7 @@ CVE-2020-24585 (An issue was discovered in the DTLS handshake implementation in
 	NOTE: https://github.com/wolfSSL/wolfssl/pull/3219
 	NOTE: https://github.com/wolfSSL/wolfssl/commit/3be7f3ea3a56d178acf0f7f84ee4ae8cbfee8915 (v4.5.0-stable)
 CVE-2020-24584 (An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10 ...)
+	{DLA-3164-1}
 	- python-django 2:2.2.16-1 (bug #969367)
 	[stretch] - python-django <not-affected> (Requires Python 3.7+)
 	NOTE: https://github.com/django/django/commit/1853724acaf17ed7414d54c7d2b5563a25025a71 (master)
@@ -153887,6 +155164,7 @@ CVE-2020-24584 (An issue was discovered in Django 2.2 before 2.2.16, 3.0 before
 	NOTE: https://github.com/django/django/commit/cdb367c92a0ba72ddc0cbd13ff42b0e6df709554 (3.0.10)
 	NOTE: https://github.com/django/django/commit/a3aebfdc8153dc230686b6d2454ccd32ed4c9e6f (2.2.16)
 CVE-2020-24583 (An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10 ...)
+	{DLA-3164-1}
 	- python-django 2:2.2.16-1 (bug #969367)
 	[stretch] - python-django <not-affected> (Requires Python 3.7+)
 	NOTE: https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9 (master)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/42fcc87f70d5d8f0497393cab5202f50747942d0

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/42fcc87f70d5d8f0497393cab5202f50747942d0
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221027/1a7cc2b6/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list