[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Jan 12 08:10:26 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1607e908 by security tracker role at 2023-01-12T08:10:14+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,237 @@
+CVE-2023-23455 (atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1. ...)
+	TODO: check
+CVE-2023-23454 (cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4  ...)
+	TODO: check
+CVE-2023-23453
+	RESERVED
+CVE-2023-23452
+	RESERVED
+CVE-2023-23451
+	RESERVED
+CVE-2023-23450
+	RESERVED
+CVE-2023-23449
+	RESERVED
+CVE-2023-23448
+	RESERVED
+CVE-2023-23447
+	RESERVED
+CVE-2023-23446
+	RESERVED
+CVE-2023-23445
+	RESERVED
+CVE-2023-23444
+	RESERVED
+CVE-2023-23443
+	RESERVED
+CVE-2023-23442
+	RESERVED
+CVE-2023-23441
+	RESERVED
+CVE-2023-23440
+	RESERVED
+CVE-2023-23439
+	RESERVED
+CVE-2023-23438
+	RESERVED
+CVE-2023-23437
+	RESERVED
+CVE-2023-23436
+	RESERVED
+CVE-2023-23435
+	RESERVED
+CVE-2023-23434
+	RESERVED
+CVE-2023-23433
+	RESERVED
+CVE-2023-23432
+	RESERVED
+CVE-2023-23431
+	RESERVED
+CVE-2023-23430
+	RESERVED
+CVE-2023-23429
+	RESERVED
+CVE-2023-23428
+	RESERVED
+CVE-2023-23427
+	RESERVED
+CVE-2023-23426
+	RESERVED
+CVE-2023-23425
+	RESERVED
+CVE-2023-23424
+	RESERVED
+CVE-2023-23423
+	RESERVED
+CVE-2023-23422
+	RESERVED
+CVE-2023-23421
+	RESERVED
+CVE-2023-23420
+	RESERVED
+CVE-2023-23419
+	RESERVED
+CVE-2023-23418
+	RESERVED
+CVE-2023-23417
+	RESERVED
+CVE-2023-23416
+	RESERVED
+CVE-2023-23415
+	RESERVED
+CVE-2023-23414
+	RESERVED
+CVE-2023-23413
+	RESERVED
+CVE-2023-23412
+	RESERVED
+CVE-2023-23411
+	RESERVED
+CVE-2023-23410
+	RESERVED
+CVE-2023-23409
+	RESERVED
+CVE-2023-23408
+	RESERVED
+CVE-2023-23407
+	RESERVED
+CVE-2023-23406
+	RESERVED
+CVE-2023-23405
+	RESERVED
+CVE-2023-23404
+	RESERVED
+CVE-2023-23403
+	RESERVED
+CVE-2023-23402
+	RESERVED
+CVE-2023-23401
+	RESERVED
+CVE-2023-23400
+	RESERVED
+CVE-2023-23399
+	RESERVED
+CVE-2023-23398
+	RESERVED
+CVE-2023-23397
+	RESERVED
+CVE-2023-23396
+	RESERVED
+CVE-2023-23395
+	RESERVED
+CVE-2023-23394
+	RESERVED
+CVE-2023-23393
+	RESERVED
+CVE-2023-23392
+	RESERVED
+CVE-2023-23391
+	RESERVED
+CVE-2023-23390
+	RESERVED
+CVE-2023-23389
+	RESERVED
+CVE-2023-23388
+	RESERVED
+CVE-2023-23387
+	RESERVED
+CVE-2023-23386
+	RESERVED
+CVE-2023-23385
+	RESERVED
+CVE-2023-23384
+	RESERVED
+CVE-2023-23383
+	RESERVED
+CVE-2023-23382
+	RESERVED
+CVE-2023-23381
+	RESERVED
+CVE-2023-23380
+	RESERVED
+CVE-2023-23379
+	RESERVED
+CVE-2023-23378
+	RESERVED
+CVE-2023-23377
+	RESERVED
+CVE-2023-23376
+	RESERVED
+CVE-2023-23375
+	RESERVED
+CVE-2023-23374
+	RESERVED
+CVE-2023-23373
+	RESERVED
+CVE-2023-23372
+	RESERVED
+CVE-2023-23371
+	RESERVED
+CVE-2023-23370
+	RESERVED
+CVE-2023-23369
+	RESERVED
+CVE-2023-23368
+	RESERVED
+CVE-2023-23367
+	RESERVED
+CVE-2023-23366
+	RESERVED
+CVE-2023-23365
+	RESERVED
+CVE-2023-23364
+	RESERVED
+CVE-2023-23363
+	RESERVED
+CVE-2023-23362
+	RESERVED
+CVE-2023-23361
+	RESERVED
+CVE-2023-23360
+	RESERVED
+CVE-2023-23359
+	RESERVED
+CVE-2023-23358
+	RESERVED
+CVE-2023-23357
+	RESERVED
+CVE-2023-23356
+	RESERVED
+CVE-2023-23355
+	RESERVED
+CVE-2023-23354
+	RESERVED
+CVE-2023-23353
+	RESERVED
+CVE-2023-23352
+	RESERVED
+CVE-2023-23351
+	RESERVED
+CVE-2023-23350
+	RESERVED
+CVE-2023-23349
+	RESERVED
+CVE-2023-0229
+	RESERVED
+CVE-2023-0228
+	RESERVED
+CVE-2023-0227 (Insufficient Session Expiration in GitHub repository pyload/pyload pri ...)
+	TODO: check
+CVE-2023-0226
+	RESERVED
+CVE-2023-0225
+	RESERVED
+CVE-2023-0224
+	RESERVED
+CVE-2023-0223
+	RESERVED
+CVE-2022-4886
+	RESERVED
+CVE-2022-48255
+	RESERVED
+CVE-2022-48254
+	RESERVED
 CVE-2023-23348
 	RESERVED
 CVE-2023-23347
@@ -2256,10 +2490,10 @@ CVE-2023-0045
 CVE-2023-0044
 	RESERVED
 	NOT-FOR-US: Quarkus
-CVE-2022-4874
-	RESERVED
-CVE-2022-4873
-	RESERVED
+CVE-2022-4874 (Authentication bypass in Netcomm router models NF20MESH, NF20, and NL1 ...)
+	TODO: check
+CVE-2022-4873 (On Netcomm router models NF20MESH, NF20, and NL1902 a stack based buff ...)
+	TODO: check
 CVE-2022-4872
 	RESERVED
 CVE-2022-48217 (** DISPUTED ** The tf_remapper_node component 1.1.1 for Robot Operatin ...)
@@ -2310,8 +2544,8 @@ CVE-2023-22587
 	RESERVED
 CVE-2023-0043
 	RESERVED
-CVE-2023-0042
-	RESERVED
+CVE-2023-0042 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+	TODO: check
 CVE-2023-0041
 	RESERVED
 CVE-2023-22586
@@ -2718,8 +2952,8 @@ CVE-2023-22494
 	RESERVED
 CVE-2023-22493
 	RESERVED
-CVE-2023-22492
-	RESERVED
+CVE-2023-22492 (ZITADEL is a combination of Auth0 and Keycloak. RefreshTokens is an OA ...)
+	TODO: check
 CVE-2023-22491
 	RESERVED
 CVE-2023-22490
@@ -2728,8 +2962,8 @@ CVE-2023-22489
 	RESERVED
 CVE-2023-22488
 	RESERVED
-CVE-2023-22487
-	RESERVED
+CVE-2023-22487 (Flarum is a forum software for building communities. Using the mention ...)
+	TODO: check
 CVE-2023-22486
 	RESERVED
 CVE-2023-22485
@@ -3988,8 +4222,7 @@ CVE-2022-47929
 	RESERVED
 CVE-2022-47928 (In MISP before 2.4.167, there is XSS in the template file uploads in a ...)
 	NOT-FOR-US: MISP
-CVE-2022-47927
-	RESERVED
+CVE-2022-47927 (An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.3 ...)
 	- mediawiki 1:1.39.1-1
 	[bullseye] - mediawiki <postponed> (Minor issue, fix along in next security update)
 	[buster] - mediawiki <postponed> (Minor issue, fix along in next security update)
@@ -6693,8 +6926,8 @@ CVE-2022-4500
 	RESERVED
 CVE-2022-4499 (TP-Link routers, Archer C5 and WR710N-V1, using the latest software, t ...)
 	TODO: check
-CVE-2022-4498
-	RESERVED
+CVE-2022-4498 (In TP-Link routers, Archer C5 and WR710N-V1, running the latest availa ...)
+	TODO: check
 CVE-2022-4497 (The Jetpack CRM WordPress plugin before 5.5 does not validate and esca ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2022-4496
@@ -8503,8 +8736,8 @@ CVE-2022-46793
 	RESERVED
 CVE-2022-4366 (Exposure of Sensitive System Information to an Unauthorized Control Sp ...)
 	NOT-FOR-US: daloRADIUS
-CVE-2022-4365
-	RESERVED
+CVE-2022-4365 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+	TODO: check
 CVE-2022-4364 (A vulnerability classified as critical has been found in Teledyne FLIR ...)
 	NOT-FOR-US: Teledyne
 CVE-2022-4363
@@ -8595,14 +8828,14 @@ CVE-2022-46769 (An improper neutralization of input during web page generation (
 	NOT-FOR-US: Apache Sling
 CVE-2022-4346
 	RESERVED
-CVE-2022-4345
-	RESERVED
-CVE-2022-4344
-	RESERVED
+CVE-2022-4345 (Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in ...)
+	TODO: check
+CVE-2022-4344 (Memory exhaustion in the Kafka protocol dissector in Wireshark 4.0.0 t ...)
+	TODO: check
 CVE-2022-4343
 	RESERVED
-CVE-2022-4342
-	RESERVED
+CVE-2022-4342 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+	TODO: check
 CVE-2022-4341 (A vulnerability has been found in csliuwy coder-chain_gdut and classif ...)
 	NOT-FOR-US: csliuwy coder-chain_gdut
 CVE-2022-46768 (Arbitrary file read vulnerability exists in Zabbix Web Service Report  ...)
@@ -10582,8 +10815,7 @@ CVE-2022-46178 (MeterSphere is a one-stop open source continuous testing platfor
 	NOT-FOR-US: MeterSphere
 CVE-2022-46177 (Discourse is an option source discussion platform. Prior to version 2. ...)
 	NOT-FOR-US: Discourse
-CVE-2022-46176
-	RESERVED
+CVE-2022-46176 (Cargo is a Rust package manager. The Rust Security Response WG was not ...)
 	- cargo <unfixed>
 	- rust-cargo <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2023/01/10/3
@@ -10700,8 +10932,8 @@ CVE-2022-4169 (The Theme and plugin translation for Polylang is vulnerable to au
 	NOT-FOR-US: Polylang
 CVE-2022-4168
 	REJECTED
-CVE-2022-4167
-	RESERVED
+CVE-2022-4167 (Incorrect Authorization check affecting all versions of GitLab EE from ...)
+	TODO: check
 CVE-2022-4166 (The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery  ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2022-4165 (The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery  ...)
@@ -11497,8 +11729,8 @@ CVE-2022-45802
 	RESERVED
 CVE-2022-45801
 	RESERVED
-CVE-2022-4131
-	RESERVED
+CVE-2022-4131 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+	TODO: check
 CVE-2022-4130 (A blind site-to-site request forgery vulnerability was found in Satell ...)
 	NOT-FOR-US: Red Hat Satellite server
 CVE-2022-4129 (A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2T ...)
@@ -12423,8 +12655,8 @@ CVE-2022-4039
 	RESERVED
 CVE-2022-4038
 	RESERVED
-CVE-2022-4037
-	RESERVED
+CVE-2022-4037 (An issue has been discovered in GitLab CE/EE affecting all versions be ...)
+	TODO: check
 CVE-2022-45459
 	RESERVED
 CVE-2022-45458
@@ -14545,8 +14777,8 @@ CVE-2022-41610
 	RESERVED
 CVE-2022-3871
 	RESERVED
-CVE-2022-3870
-	RESERVED
+CVE-2022-3870 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+	TODO: check
 CVE-2022-44783
 	RESERVED
 CVE-2022-44782
@@ -16415,7 +16647,7 @@ CVE-2022-3784 (A vulnerability classified as critical was found in Axiomatic Ben
 	NOT-FOR-US: Bento4
 CVE-2022-3783 (A vulnerability, which was classified as problematic, has been found i ...)
 	NOT-FOR-US: node-red-dashboard
-CVE-2022-3782 (keycloak: path traversal via double URL encoding ...)
+CVE-2022-3782 (keycloak: path traversal via double URL encoding. A flaw was found in  ...)
 	NOT-FOR-US: Keycloak
 CVE-2022-3781 (Dashlane password and Keepass Server password in My Account Settings a ...)
 	NOT-FOR-US: Devolutions Remote Desktop Manager
@@ -20873,8 +21105,8 @@ CVE-2022-3615
 	RESERVED
 CVE-2022-3614 (In affected versions of Octopus Deploy users of certain browsers using ...)
 	NOT-FOR-US: Octopus Deploy
-CVE-2022-3613
-	RESERVED
+CVE-2022-3613 (An issue has been discovered in GitLab CE/EE affecting all versions be ...)
+	TODO: check
 CVE-2022-3612
 	RESERVED
 CVE-2022-3611
@@ -21114,8 +21346,8 @@ CVE-2022-3575 (Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8
 	NOT-FOR-US: Frauscher Sensortechnik
 CVE-2022-3574 (The WPForms Pro WordPress plugin before 1.7.7 does not validate its fo ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2022-3573
-	RESERVED
+CVE-2022-3573 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+	TODO: check
 CVE-2022-3572
 	RESERVED
 	- gitlab <unfixed>
@@ -22335,8 +22567,8 @@ CVE-2022-3515
 	NOTE: https://gnupg.org/blog/20221017-pepe-left-the-ksba.html
 	NOTE: https://dev.gnupg.org/T6230
 	NOTE: https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
-CVE-2022-3514
-	RESERVED
+CVE-2022-3514 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+	TODO: check
 CVE-2022-3513
 	RESERVED
 CVE-2022-3512 (Using warp-cli command "add-trusted-ssid", a user was able to disconne ...)
@@ -24923,6 +25155,7 @@ CVE-2022-41968 (Nextcloud Server is an open source personal cloud server. Prior
 CVE-2022-41967 (Dragonfly is a Java runtime dependency management library. Dragonfly v ...)
 	NOT-FOR-US: Dragonfly
 CVE-2022-41966 (XStream serializes Java objects to XML and back again. Versions prior  ...)
+	{DSA-5315-1 DLA-3267-1}
 	- libxstream-java 1.4.20-1 (bug #1027754)
 	NOTE: https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv
 	NOTE: https://x-stream.github.io/CVE-2022-41966.html
@@ -25039,6 +25272,7 @@ CVE-2022-41916 (Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. V
 	NOTE: https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx
 	NOTE: https://github.com/heimdal/heimdal/commit/eb87af0c2d189c25294c7daf483a47b03af80c2c (heimdal-7.7.1)
 CVE-2022-41915 (Netty project is an event-driven asynchronous network application fram ...)
+	{DSA-5316-1 DLA-3268-1}
 	- netty 1:4.1.48-6 (bug #1027180)
 	NOTE: https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp
 	NOTE: Fixed by https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4 (netty-4.1.86.Final)
@@ -25117,6 +25351,7 @@ CVE-2022-41882 (The Nextcloud Desktop Client is a tool to synchronize files from
 	NOTE: https://github.com/nextcloud/server/pull/34559
 	TODO: check details, is owncloud-client similarly affected?
 CVE-2022-41881 (Netty project is an event-driven asynchronous network application fram ...)
+	{DSA-5316-1 DLA-3268-1}
 	- netty 1:4.1.48-6 (bug #1027180)
 	NOTE: https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985v
 	NOTE: Fixed by https://github.com/netty/netty/commit/cd91cf3c99123bd1e53fd6a1de0e3d1922f05bb2 (netty-4.1.86.Final)
@@ -25364,13 +25599,13 @@ CVE-2022-41848 (drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.
 	- linux <unfixed>
 	NOTE: https://lore.kernel.org/lkml/20220919040251.GA302541@ubuntu/T/#rc85e751f467b3e6f9ccef92cfa7fb8a6cc50c270
 CVE-2022-41812
-	RESERVED
+	REJECTED
 CVE-2022-41811
-	RESERVED
+	REJECTED
 CVE-2022-41810
-	RESERVED
+	REJECTED
 CVE-2022-41809
-	RESERVED
+	REJECTED
 CVE-2022-41779 (Delta Electronics InfraSuite Device Master versions 00.00.01a and prio ...)
 	NOT-FOR-US: Delta Electronics
 CVE-2022-41778
@@ -29609,8 +29844,7 @@ CVE-2022-3145
 	RESERVED
 CVE-2022-3144 (The Wordfence Security – Firewall & Malware Scan plugin for  ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2022-3143
-	RESERVED
+CVE-2022-3143 (wildfly-elytron: possible timing attacks via use of unsafe comparator. ...)
 	NOT-FOR-US: WildFly Elytron
 CVE-2022-40137
 	RESERVED
@@ -69696,8 +69930,8 @@ CVE-2022-25231 (The package node-opcua before 2.74.0 are vulnerable to Denial of
 	NOT-FOR-US: node-opcua/node-opcua
 CVE-2022-25171 (The package p4 before 0.0.7 are vulnerable to Command Injection via th ...)
 	TODO: check
-CVE-2022-24913
-	RESERVED
+CVE-2022-24913 (Versions of the package com.fasterxml.util:java-merge-sort before 1.1. ...)
+	TODO: check
 CVE-2022-24912 (The package github.com/runatlantis/atlantis/server/controllers/events  ...)
 	NOT-FOR-US: github.com/runatlantis/atlantis
 CVE-2022-24909
@@ -90448,6 +90682,7 @@ CVE-2021-43799 (Zulip is an open-source team collaboration tool. Zulip Server in
 CVE-2021-43798 (Grafana is an open-source platform for monitoring and observability. G ...)
 	- grafana <removed>
 CVE-2021-43797 (Netty is an asynchronous event-driven network application framework fo ...)
+	{DSA-5316-1 DLA-3268-1}
 	- netty 1:4.1.48-6 (bug #1001437)
 	[stretch] - netty <no-dsa> (Minor issue)
 	NOTE: https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq
@@ -110928,11 +111163,13 @@ CVE-2021-37139
 CVE-2021-37138
 	RESERVED
 CVE-2021-37137 (The Snappy frame decoder function doesn't restrict the chunk length wh ...)
+	{DSA-5316-1 DLA-3268-1}
 	- netty 1:4.1.48-6 (bug #1014769)
 	[stretch] - netty <no-dsa> (Minor issue)
 	NOTE: https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363
 	NOTE: Fixed by: https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f (netty-4.1.68.Final)
 CVE-2021-37136 (The Bzip2 decompression decoder function doesn't allow setting size re ...)
+	{DSA-5316-1 DLA-3268-1}
 	- netty 1:4.1.48-6 (bug #1014769)
 	[stretch] - netty <no-dsa> (Minor issue)
 	NOTE: https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv
@@ -350704,168 +350941,168 @@ CVE-2017-16338 (An attacker could send an authenticated HTTP request to trigger
 	NOT-FOR-US: Insteon Hub
 CVE-2017-16337 (On Insteon Hub 2245-222 devices with firmware version 1012, specially  ...)
 	NOT-FOR-US: Insteon Hub
-CVE-2017-16336
-	RESERVED
-CVE-2017-16335
-	RESERVED
-CVE-2017-16334
-	RESERVED
-CVE-2017-16333
-	RESERVED
-CVE-2017-16332
-	RESERVED
-CVE-2017-16331
-	RESERVED
-CVE-2017-16330
-	RESERVED
-CVE-2017-16329
-	RESERVED
-CVE-2017-16328
-	RESERVED
-CVE-2017-16327
-	RESERVED
-CVE-2017-16326
-	RESERVED
-CVE-2017-16325
-	RESERVED
-CVE-2017-16324
-	RESERVED
-CVE-2017-16323
-	RESERVED
-CVE-2017-16322
-	RESERVED
-CVE-2017-16321
-	RESERVED
-CVE-2017-16320
-	RESERVED
-CVE-2017-16319
-	RESERVED
-CVE-2017-16318
-	RESERVED
-CVE-2017-16317
-	RESERVED
-CVE-2017-16316
-	RESERVED
-CVE-2017-16315
-	RESERVED
-CVE-2017-16314
-	RESERVED
-CVE-2017-16313
-	RESERVED
-CVE-2017-16312
-	RESERVED
-CVE-2017-16311
-	RESERVED
-CVE-2017-16310
-	RESERVED
-CVE-2017-16309
-	RESERVED
-CVE-2017-16308
-	RESERVED
-CVE-2017-16307
-	RESERVED
-CVE-2017-16306
-	RESERVED
-CVE-2017-16305
-	RESERVED
-CVE-2017-16304
-	RESERVED
-CVE-2017-16303
-	RESERVED
-CVE-2017-16302
-	RESERVED
-CVE-2017-16301
-	RESERVED
-CVE-2017-16300
-	RESERVED
-CVE-2017-16299
-	RESERVED
-CVE-2017-16298
-	RESERVED
-CVE-2017-16297
-	RESERVED
-CVE-2017-16296
-	RESERVED
-CVE-2017-16295
-	RESERVED
-CVE-2017-16294
-	RESERVED
-CVE-2017-16293
-	RESERVED
-CVE-2017-16292
-	RESERVED
-CVE-2017-16291
-	RESERVED
-CVE-2017-16290
-	RESERVED
-CVE-2017-16289
-	RESERVED
-CVE-2017-16288
-	RESERVED
-CVE-2017-16287
-	RESERVED
-CVE-2017-16286
-	RESERVED
-CVE-2017-16285
-	RESERVED
-CVE-2017-16284
-	RESERVED
-CVE-2017-16283
-	RESERVED
-CVE-2017-16282
-	RESERVED
-CVE-2017-16281
-	RESERVED
-CVE-2017-16280
-	RESERVED
-CVE-2017-16279
-	RESERVED
-CVE-2017-16278
-	RESERVED
-CVE-2017-16277
-	RESERVED
-CVE-2017-16276
-	RESERVED
-CVE-2017-16275
-	RESERVED
-CVE-2017-16274
-	RESERVED
-CVE-2017-16273
-	RESERVED
-CVE-2017-16272
-	RESERVED
-CVE-2017-16271
-	RESERVED
-CVE-2017-16270
-	RESERVED
-CVE-2017-16269
-	RESERVED
-CVE-2017-16268
-	RESERVED
-CVE-2017-16267
-	RESERVED
-CVE-2017-16266
-	RESERVED
-CVE-2017-16265
-	RESERVED
-CVE-2017-16264
-	RESERVED
-CVE-2017-16263
-	RESERVED
-CVE-2017-16262
-	RESERVED
-CVE-2017-16261
-	RESERVED
-CVE-2017-16260
-	RESERVED
-CVE-2017-16259
-	RESERVED
-CVE-2017-16258
-	RESERVED
-CVE-2017-16257
-	RESERVED
-CVE-2017-16256
-	RESERVED
+CVE-2017-16336 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16335 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16334 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16333 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16332 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16331 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16330 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16329 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16328 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16327 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16326 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16325 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16324 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16323 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16322 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16321 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16320 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16319 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16318 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16317 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16316 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16315 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16314 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16313 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16312 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16311 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16310 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16309 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16308 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16307 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16306 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16305 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16304 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16303 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16302 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16301 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16300 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16299 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16298 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16297 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16296 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16295 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16294 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16293 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16292 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16291 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16290 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16289 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16288 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16287 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16286 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16285 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16284 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16283 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16282 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16281 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16280 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16279 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16278 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16277 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16276 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16275 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16274 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16273 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16272 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16271 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16270 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16269 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16268 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16267 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16266 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16265 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16264 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16263 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16262 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16261 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16260 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16259 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16258 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16257 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
+CVE-2017-16256 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+	TODO: check
 CVE-2017-16255 (An exploitable buffer overflow vulnerability exists in the PubNub mess ...)
 	NOT-FOR-US: Insteon Hub
 CVE-2017-16254 (An exploitable buffer overflow vulnerability exists in the PubNub mess ...)
@@ -356555,8 +356792,8 @@ CVE-2017-14456
 	REJECTED
 CVE-2017-14455 (On Insteon Hub 2245-222 devices with firmware version 1012, specially  ...)
 	NOT-FOR-US: Insteon Hub
-CVE-2017-14454
-	RESERVED
+CVE-2017-14454 (Multiple exploitable buffer overflow vulnerabilities exists in the Pub ...)
+	TODO: check
 CVE-2017-14453 (On Insteon Hub 2245-222 devices with firmware version 1012, specially  ...)
 	NOT-FOR-US: Insteon Hub
 CVE-2017-14452 (An exploitable buffer overflow vulnerability exists in the PubNub mess ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1607e908c3a75e4826deeba9309eed6019d4e6f5

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1607e908c3a75e4826deeba9309eed6019d4e6f5
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230112/62ae1cdc/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list