[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Jan 12 08:10:26 GMT 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
1607e908 by security tracker role at 2023-01-12T08:10:14+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,237 @@
+CVE-2023-23455 (atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1. ...)
+ TODO: check
+CVE-2023-23454 (cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 ...)
+ TODO: check
+CVE-2023-23453
+ RESERVED
+CVE-2023-23452
+ RESERVED
+CVE-2023-23451
+ RESERVED
+CVE-2023-23450
+ RESERVED
+CVE-2023-23449
+ RESERVED
+CVE-2023-23448
+ RESERVED
+CVE-2023-23447
+ RESERVED
+CVE-2023-23446
+ RESERVED
+CVE-2023-23445
+ RESERVED
+CVE-2023-23444
+ RESERVED
+CVE-2023-23443
+ RESERVED
+CVE-2023-23442
+ RESERVED
+CVE-2023-23441
+ RESERVED
+CVE-2023-23440
+ RESERVED
+CVE-2023-23439
+ RESERVED
+CVE-2023-23438
+ RESERVED
+CVE-2023-23437
+ RESERVED
+CVE-2023-23436
+ RESERVED
+CVE-2023-23435
+ RESERVED
+CVE-2023-23434
+ RESERVED
+CVE-2023-23433
+ RESERVED
+CVE-2023-23432
+ RESERVED
+CVE-2023-23431
+ RESERVED
+CVE-2023-23430
+ RESERVED
+CVE-2023-23429
+ RESERVED
+CVE-2023-23428
+ RESERVED
+CVE-2023-23427
+ RESERVED
+CVE-2023-23426
+ RESERVED
+CVE-2023-23425
+ RESERVED
+CVE-2023-23424
+ RESERVED
+CVE-2023-23423
+ RESERVED
+CVE-2023-23422
+ RESERVED
+CVE-2023-23421
+ RESERVED
+CVE-2023-23420
+ RESERVED
+CVE-2023-23419
+ RESERVED
+CVE-2023-23418
+ RESERVED
+CVE-2023-23417
+ RESERVED
+CVE-2023-23416
+ RESERVED
+CVE-2023-23415
+ RESERVED
+CVE-2023-23414
+ RESERVED
+CVE-2023-23413
+ RESERVED
+CVE-2023-23412
+ RESERVED
+CVE-2023-23411
+ RESERVED
+CVE-2023-23410
+ RESERVED
+CVE-2023-23409
+ RESERVED
+CVE-2023-23408
+ RESERVED
+CVE-2023-23407
+ RESERVED
+CVE-2023-23406
+ RESERVED
+CVE-2023-23405
+ RESERVED
+CVE-2023-23404
+ RESERVED
+CVE-2023-23403
+ RESERVED
+CVE-2023-23402
+ RESERVED
+CVE-2023-23401
+ RESERVED
+CVE-2023-23400
+ RESERVED
+CVE-2023-23399
+ RESERVED
+CVE-2023-23398
+ RESERVED
+CVE-2023-23397
+ RESERVED
+CVE-2023-23396
+ RESERVED
+CVE-2023-23395
+ RESERVED
+CVE-2023-23394
+ RESERVED
+CVE-2023-23393
+ RESERVED
+CVE-2023-23392
+ RESERVED
+CVE-2023-23391
+ RESERVED
+CVE-2023-23390
+ RESERVED
+CVE-2023-23389
+ RESERVED
+CVE-2023-23388
+ RESERVED
+CVE-2023-23387
+ RESERVED
+CVE-2023-23386
+ RESERVED
+CVE-2023-23385
+ RESERVED
+CVE-2023-23384
+ RESERVED
+CVE-2023-23383
+ RESERVED
+CVE-2023-23382
+ RESERVED
+CVE-2023-23381
+ RESERVED
+CVE-2023-23380
+ RESERVED
+CVE-2023-23379
+ RESERVED
+CVE-2023-23378
+ RESERVED
+CVE-2023-23377
+ RESERVED
+CVE-2023-23376
+ RESERVED
+CVE-2023-23375
+ RESERVED
+CVE-2023-23374
+ RESERVED
+CVE-2023-23373
+ RESERVED
+CVE-2023-23372
+ RESERVED
+CVE-2023-23371
+ RESERVED
+CVE-2023-23370
+ RESERVED
+CVE-2023-23369
+ RESERVED
+CVE-2023-23368
+ RESERVED
+CVE-2023-23367
+ RESERVED
+CVE-2023-23366
+ RESERVED
+CVE-2023-23365
+ RESERVED
+CVE-2023-23364
+ RESERVED
+CVE-2023-23363
+ RESERVED
+CVE-2023-23362
+ RESERVED
+CVE-2023-23361
+ RESERVED
+CVE-2023-23360
+ RESERVED
+CVE-2023-23359
+ RESERVED
+CVE-2023-23358
+ RESERVED
+CVE-2023-23357
+ RESERVED
+CVE-2023-23356
+ RESERVED
+CVE-2023-23355
+ RESERVED
+CVE-2023-23354
+ RESERVED
+CVE-2023-23353
+ RESERVED
+CVE-2023-23352
+ RESERVED
+CVE-2023-23351
+ RESERVED
+CVE-2023-23350
+ RESERVED
+CVE-2023-23349
+ RESERVED
+CVE-2023-0229
+ RESERVED
+CVE-2023-0228
+ RESERVED
+CVE-2023-0227 (Insufficient Session Expiration in GitHub repository pyload/pyload pri ...)
+ TODO: check
+CVE-2023-0226
+ RESERVED
+CVE-2023-0225
+ RESERVED
+CVE-2023-0224
+ RESERVED
+CVE-2023-0223
+ RESERVED
+CVE-2022-4886
+ RESERVED
+CVE-2022-48255
+ RESERVED
+CVE-2022-48254
+ RESERVED
CVE-2023-23348
RESERVED
CVE-2023-23347
@@ -2256,10 +2490,10 @@ CVE-2023-0045
CVE-2023-0044
RESERVED
NOT-FOR-US: Quarkus
-CVE-2022-4874
- RESERVED
-CVE-2022-4873
- RESERVED
+CVE-2022-4874 (Authentication bypass in Netcomm router models NF20MESH, NF20, and NL1 ...)
+ TODO: check
+CVE-2022-4873 (On Netcomm router models NF20MESH, NF20, and NL1902 a stack based buff ...)
+ TODO: check
CVE-2022-4872
RESERVED
CVE-2022-48217 (** DISPUTED ** The tf_remapper_node component 1.1.1 for Robot Operatin ...)
@@ -2310,8 +2544,8 @@ CVE-2023-22587
RESERVED
CVE-2023-0043
RESERVED
-CVE-2023-0042
- RESERVED
+CVE-2023-0042 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+ TODO: check
CVE-2023-0041
RESERVED
CVE-2023-22586
@@ -2718,8 +2952,8 @@ CVE-2023-22494
RESERVED
CVE-2023-22493
RESERVED
-CVE-2023-22492
- RESERVED
+CVE-2023-22492 (ZITADEL is a combination of Auth0 and Keycloak. RefreshTokens is an OA ...)
+ TODO: check
CVE-2023-22491
RESERVED
CVE-2023-22490
@@ -2728,8 +2962,8 @@ CVE-2023-22489
RESERVED
CVE-2023-22488
RESERVED
-CVE-2023-22487
- RESERVED
+CVE-2023-22487 (Flarum is a forum software for building communities. Using the mention ...)
+ TODO: check
CVE-2023-22486
RESERVED
CVE-2023-22485
@@ -3988,8 +4222,7 @@ CVE-2022-47929
RESERVED
CVE-2022-47928 (In MISP before 2.4.167, there is XSS in the template file uploads in a ...)
NOT-FOR-US: MISP
-CVE-2022-47927
- RESERVED
+CVE-2022-47927 (An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.3 ...)
- mediawiki 1:1.39.1-1
[bullseye] - mediawiki <postponed> (Minor issue, fix along in next security update)
[buster] - mediawiki <postponed> (Minor issue, fix along in next security update)
@@ -6693,8 +6926,8 @@ CVE-2022-4500
RESERVED
CVE-2022-4499 (TP-Link routers, Archer C5 and WR710N-V1, using the latest software, t ...)
TODO: check
-CVE-2022-4498
- RESERVED
+CVE-2022-4498 (In TP-Link routers, Archer C5 and WR710N-V1, running the latest availa ...)
+ TODO: check
CVE-2022-4497 (The Jetpack CRM WordPress plugin before 5.5 does not validate and esca ...)
NOT-FOR-US: WordPress plugin
CVE-2022-4496
@@ -8503,8 +8736,8 @@ CVE-2022-46793
RESERVED
CVE-2022-4366 (Exposure of Sensitive System Information to an Unauthorized Control Sp ...)
NOT-FOR-US: daloRADIUS
-CVE-2022-4365
- RESERVED
+CVE-2022-4365 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+ TODO: check
CVE-2022-4364 (A vulnerability classified as critical has been found in Teledyne FLIR ...)
NOT-FOR-US: Teledyne
CVE-2022-4363
@@ -8595,14 +8828,14 @@ CVE-2022-46769 (An improper neutralization of input during web page generation (
NOT-FOR-US: Apache Sling
CVE-2022-4346
RESERVED
-CVE-2022-4345
- RESERVED
-CVE-2022-4344
- RESERVED
+CVE-2022-4345 (Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in ...)
+ TODO: check
+CVE-2022-4344 (Memory exhaustion in the Kafka protocol dissector in Wireshark 4.0.0 t ...)
+ TODO: check
CVE-2022-4343
RESERVED
-CVE-2022-4342
- RESERVED
+CVE-2022-4342 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+ TODO: check
CVE-2022-4341 (A vulnerability has been found in csliuwy coder-chain_gdut and classif ...)
NOT-FOR-US: csliuwy coder-chain_gdut
CVE-2022-46768 (Arbitrary file read vulnerability exists in Zabbix Web Service Report ...)
@@ -10582,8 +10815,7 @@ CVE-2022-46178 (MeterSphere is a one-stop open source continuous testing platfor
NOT-FOR-US: MeterSphere
CVE-2022-46177 (Discourse is an option source discussion platform. Prior to version 2. ...)
NOT-FOR-US: Discourse
-CVE-2022-46176
- RESERVED
+CVE-2022-46176 (Cargo is a Rust package manager. The Rust Security Response WG was not ...)
- cargo <unfixed>
- rust-cargo <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2023/01/10/3
@@ -10700,8 +10932,8 @@ CVE-2022-4169 (The Theme and plugin translation for Polylang is vulnerable to au
NOT-FOR-US: Polylang
CVE-2022-4168
REJECTED
-CVE-2022-4167
- RESERVED
+CVE-2022-4167 (Incorrect Authorization check affecting all versions of GitLab EE from ...)
+ TODO: check
CVE-2022-4166 (The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery ...)
NOT-FOR-US: WordPress plugin
CVE-2022-4165 (The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery ...)
@@ -11497,8 +11729,8 @@ CVE-2022-45802
RESERVED
CVE-2022-45801
RESERVED
-CVE-2022-4131
- RESERVED
+CVE-2022-4131 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+ TODO: check
CVE-2022-4130 (A blind site-to-site request forgery vulnerability was found in Satell ...)
NOT-FOR-US: Red Hat Satellite server
CVE-2022-4129 (A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2T ...)
@@ -12423,8 +12655,8 @@ CVE-2022-4039
RESERVED
CVE-2022-4038
RESERVED
-CVE-2022-4037
- RESERVED
+CVE-2022-4037 (An issue has been discovered in GitLab CE/EE affecting all versions be ...)
+ TODO: check
CVE-2022-45459
RESERVED
CVE-2022-45458
@@ -14545,8 +14777,8 @@ CVE-2022-41610
RESERVED
CVE-2022-3871
RESERVED
-CVE-2022-3870
- RESERVED
+CVE-2022-3870 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+ TODO: check
CVE-2022-44783
RESERVED
CVE-2022-44782
@@ -16415,7 +16647,7 @@ CVE-2022-3784 (A vulnerability classified as critical was found in Axiomatic Ben
NOT-FOR-US: Bento4
CVE-2022-3783 (A vulnerability, which was classified as problematic, has been found i ...)
NOT-FOR-US: node-red-dashboard
-CVE-2022-3782 (keycloak: path traversal via double URL encoding ...)
+CVE-2022-3782 (keycloak: path traversal via double URL encoding. A flaw was found in ...)
NOT-FOR-US: Keycloak
CVE-2022-3781 (Dashlane password and Keepass Server password in My Account Settings a ...)
NOT-FOR-US: Devolutions Remote Desktop Manager
@@ -20873,8 +21105,8 @@ CVE-2022-3615
RESERVED
CVE-2022-3614 (In affected versions of Octopus Deploy users of certain browsers using ...)
NOT-FOR-US: Octopus Deploy
-CVE-2022-3613
- RESERVED
+CVE-2022-3613 (An issue has been discovered in GitLab CE/EE affecting all versions be ...)
+ TODO: check
CVE-2022-3612
RESERVED
CVE-2022-3611
@@ -21114,8 +21346,8 @@ CVE-2022-3575 (Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8
NOT-FOR-US: Frauscher Sensortechnik
CVE-2022-3574 (The WPForms Pro WordPress plugin before 1.7.7 does not validate its fo ...)
NOT-FOR-US: WordPress plugin
-CVE-2022-3573
- RESERVED
+CVE-2022-3573 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+ TODO: check
CVE-2022-3572
RESERVED
- gitlab <unfixed>
@@ -22335,8 +22567,8 @@ CVE-2022-3515
NOTE: https://gnupg.org/blog/20221017-pepe-left-the-ksba.html
NOTE: https://dev.gnupg.org/T6230
NOTE: https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
-CVE-2022-3514
- RESERVED
+CVE-2022-3514 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
+ TODO: check
CVE-2022-3513
RESERVED
CVE-2022-3512 (Using warp-cli command "add-trusted-ssid", a user was able to disconne ...)
@@ -24923,6 +25155,7 @@ CVE-2022-41968 (Nextcloud Server is an open source personal cloud server. Prior
CVE-2022-41967 (Dragonfly is a Java runtime dependency management library. Dragonfly v ...)
NOT-FOR-US: Dragonfly
CVE-2022-41966 (XStream serializes Java objects to XML and back again. Versions prior ...)
+ {DSA-5315-1 DLA-3267-1}
- libxstream-java 1.4.20-1 (bug #1027754)
NOTE: https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv
NOTE: https://x-stream.github.io/CVE-2022-41966.html
@@ -25039,6 +25272,7 @@ CVE-2022-41916 (Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. V
NOTE: https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx
NOTE: https://github.com/heimdal/heimdal/commit/eb87af0c2d189c25294c7daf483a47b03af80c2c (heimdal-7.7.1)
CVE-2022-41915 (Netty project is an event-driven asynchronous network application fram ...)
+ {DSA-5316-1 DLA-3268-1}
- netty 1:4.1.48-6 (bug #1027180)
NOTE: https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp
NOTE: Fixed by https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4 (netty-4.1.86.Final)
@@ -25117,6 +25351,7 @@ CVE-2022-41882 (The Nextcloud Desktop Client is a tool to synchronize files from
NOTE: https://github.com/nextcloud/server/pull/34559
TODO: check details, is owncloud-client similarly affected?
CVE-2022-41881 (Netty project is an event-driven asynchronous network application fram ...)
+ {DSA-5316-1 DLA-3268-1}
- netty 1:4.1.48-6 (bug #1027180)
NOTE: https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985v
NOTE: Fixed by https://github.com/netty/netty/commit/cd91cf3c99123bd1e53fd6a1de0e3d1922f05bb2 (netty-4.1.86.Final)
@@ -25364,13 +25599,13 @@ CVE-2022-41848 (drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.
- linux <unfixed>
NOTE: https://lore.kernel.org/lkml/20220919040251.GA302541@ubuntu/T/#rc85e751f467b3e6f9ccef92cfa7fb8a6cc50c270
CVE-2022-41812
- RESERVED
+ REJECTED
CVE-2022-41811
- RESERVED
+ REJECTED
CVE-2022-41810
- RESERVED
+ REJECTED
CVE-2022-41809
- RESERVED
+ REJECTED
CVE-2022-41779 (Delta Electronics InfraSuite Device Master versions 00.00.01a and prio ...)
NOT-FOR-US: Delta Electronics
CVE-2022-41778
@@ -29609,8 +29844,7 @@ CVE-2022-3145
RESERVED
CVE-2022-3144 (The Wordfence Security – Firewall & Malware Scan plugin for ...)
NOT-FOR-US: WordPress plugin
-CVE-2022-3143
- RESERVED
+CVE-2022-3143 (wildfly-elytron: possible timing attacks via use of unsafe comparator. ...)
NOT-FOR-US: WildFly Elytron
CVE-2022-40137
RESERVED
@@ -69696,8 +69930,8 @@ CVE-2022-25231 (The package node-opcua before 2.74.0 are vulnerable to Denial of
NOT-FOR-US: node-opcua/node-opcua
CVE-2022-25171 (The package p4 before 0.0.7 are vulnerable to Command Injection via th ...)
TODO: check
-CVE-2022-24913
- RESERVED
+CVE-2022-24913 (Versions of the package com.fasterxml.util:java-merge-sort before 1.1. ...)
+ TODO: check
CVE-2022-24912 (The package github.com/runatlantis/atlantis/server/controllers/events ...)
NOT-FOR-US: github.com/runatlantis/atlantis
CVE-2022-24909
@@ -90448,6 +90682,7 @@ CVE-2021-43799 (Zulip is an open-source team collaboration tool. Zulip Server in
CVE-2021-43798 (Grafana is an open-source platform for monitoring and observability. G ...)
- grafana <removed>
CVE-2021-43797 (Netty is an asynchronous event-driven network application framework fo ...)
+ {DSA-5316-1 DLA-3268-1}
- netty 1:4.1.48-6 (bug #1001437)
[stretch] - netty <no-dsa> (Minor issue)
NOTE: https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq
@@ -110928,11 +111163,13 @@ CVE-2021-37139
CVE-2021-37138
RESERVED
CVE-2021-37137 (The Snappy frame decoder function doesn't restrict the chunk length wh ...)
+ {DSA-5316-1 DLA-3268-1}
- netty 1:4.1.48-6 (bug #1014769)
[stretch] - netty <no-dsa> (Minor issue)
NOTE: https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363
NOTE: Fixed by: https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f (netty-4.1.68.Final)
CVE-2021-37136 (The Bzip2 decompression decoder function doesn't allow setting size re ...)
+ {DSA-5316-1 DLA-3268-1}
- netty 1:4.1.48-6 (bug #1014769)
[stretch] - netty <no-dsa> (Minor issue)
NOTE: https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv
@@ -350704,168 +350941,168 @@ CVE-2017-16338 (An attacker could send an authenticated HTTP request to trigger
NOT-FOR-US: Insteon Hub
CVE-2017-16337 (On Insteon Hub 2245-222 devices with firmware version 1012, specially ...)
NOT-FOR-US: Insteon Hub
-CVE-2017-16336
- RESERVED
-CVE-2017-16335
- RESERVED
-CVE-2017-16334
- RESERVED
-CVE-2017-16333
- RESERVED
-CVE-2017-16332
- RESERVED
-CVE-2017-16331
- RESERVED
-CVE-2017-16330
- RESERVED
-CVE-2017-16329
- RESERVED
-CVE-2017-16328
- RESERVED
-CVE-2017-16327
- RESERVED
-CVE-2017-16326
- RESERVED
-CVE-2017-16325
- RESERVED
-CVE-2017-16324
- RESERVED
-CVE-2017-16323
- RESERVED
-CVE-2017-16322
- RESERVED
-CVE-2017-16321
- RESERVED
-CVE-2017-16320
- RESERVED
-CVE-2017-16319
- RESERVED
-CVE-2017-16318
- RESERVED
-CVE-2017-16317
- RESERVED
-CVE-2017-16316
- RESERVED
-CVE-2017-16315
- RESERVED
-CVE-2017-16314
- RESERVED
-CVE-2017-16313
- RESERVED
-CVE-2017-16312
- RESERVED
-CVE-2017-16311
- RESERVED
-CVE-2017-16310
- RESERVED
-CVE-2017-16309
- RESERVED
-CVE-2017-16308
- RESERVED
-CVE-2017-16307
- RESERVED
-CVE-2017-16306
- RESERVED
-CVE-2017-16305
- RESERVED
-CVE-2017-16304
- RESERVED
-CVE-2017-16303
- RESERVED
-CVE-2017-16302
- RESERVED
-CVE-2017-16301
- RESERVED
-CVE-2017-16300
- RESERVED
-CVE-2017-16299
- RESERVED
-CVE-2017-16298
- RESERVED
-CVE-2017-16297
- RESERVED
-CVE-2017-16296
- RESERVED
-CVE-2017-16295
- RESERVED
-CVE-2017-16294
- RESERVED
-CVE-2017-16293
- RESERVED
-CVE-2017-16292
- RESERVED
-CVE-2017-16291
- RESERVED
-CVE-2017-16290
- RESERVED
-CVE-2017-16289
- RESERVED
-CVE-2017-16288
- RESERVED
-CVE-2017-16287
- RESERVED
-CVE-2017-16286
- RESERVED
-CVE-2017-16285
- RESERVED
-CVE-2017-16284
- RESERVED
-CVE-2017-16283
- RESERVED
-CVE-2017-16282
- RESERVED
-CVE-2017-16281
- RESERVED
-CVE-2017-16280
- RESERVED
-CVE-2017-16279
- RESERVED
-CVE-2017-16278
- RESERVED
-CVE-2017-16277
- RESERVED
-CVE-2017-16276
- RESERVED
-CVE-2017-16275
- RESERVED
-CVE-2017-16274
- RESERVED
-CVE-2017-16273
- RESERVED
-CVE-2017-16272
- RESERVED
-CVE-2017-16271
- RESERVED
-CVE-2017-16270
- RESERVED
-CVE-2017-16269
- RESERVED
-CVE-2017-16268
- RESERVED
-CVE-2017-16267
- RESERVED
-CVE-2017-16266
- RESERVED
-CVE-2017-16265
- RESERVED
-CVE-2017-16264
- RESERVED
-CVE-2017-16263
- RESERVED
-CVE-2017-16262
- RESERVED
-CVE-2017-16261
- RESERVED
-CVE-2017-16260
- RESERVED
-CVE-2017-16259
- RESERVED
-CVE-2017-16258
- RESERVED
-CVE-2017-16257
- RESERVED
-CVE-2017-16256
- RESERVED
+CVE-2017-16336 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16335 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16334 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16333 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16332 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16331 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16330 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16329 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16328 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16327 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16326 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16325 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16324 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16323 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16322 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16321 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16320 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16319 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16318 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16317 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16316 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16315 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16314 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16313 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16312 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16311 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16310 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16309 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16308 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16307 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16306 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16305 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16304 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16303 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16302 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16301 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16300 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16299 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16298 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16297 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16296 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16295 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16294 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16293 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16292 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16291 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16290 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16289 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16288 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16287 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16286 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16285 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16284 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16283 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16282 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16281 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16280 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16279 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16278 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16277 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16276 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16275 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16274 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16273 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16272 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16271 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16270 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16269 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16268 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16267 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16266 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16265 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16264 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16263 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16262 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16261 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16260 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16259 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16258 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16257 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
+CVE-2017-16256 (Multiple exploitable buffer overflow vulnerabilities exist in the PubN ...)
+ TODO: check
CVE-2017-16255 (An exploitable buffer overflow vulnerability exists in the PubNub mess ...)
NOT-FOR-US: Insteon Hub
CVE-2017-16254 (An exploitable buffer overflow vulnerability exists in the PubNub mess ...)
@@ -356555,8 +356792,8 @@ CVE-2017-14456
REJECTED
CVE-2017-14455 (On Insteon Hub 2245-222 devices with firmware version 1012, specially ...)
NOT-FOR-US: Insteon Hub
-CVE-2017-14454
- RESERVED
+CVE-2017-14454 (Multiple exploitable buffer overflow vulnerabilities exists in the Pub ...)
+ TODO: check
CVE-2017-14453 (On Insteon Hub 2245-222 devices with firmware version 1012, specially ...)
NOT-FOR-US: Insteon Hub
CVE-2017-14452 (An exploitable buffer overflow vulnerability exists in the PubNub mess ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1607e908c3a75e4826deeba9309eed6019d4e6f5
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1607e908c3a75e4826deeba9309eed6019d4e6f5
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230112/62ae1cdc/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list