[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Fri Jan 13 10:18:08 GMT 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
691f6df3 by Moritz Muehlenhoff at 2023-01-13T11:17:43+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -4134,59 +4134,59 @@ CVE-2020-36635 (A vulnerability was found in OpenMRS Appointment Scheduling Modu
 CVE-2019-25091 (A vulnerability classified as problematic has been found in nsupdate.i ...)
 	NOT-FOR-US: nsupdate.info
 CVE-2023-22417 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22416 (A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos O ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22415 (An Out-of-Bounds Write vulnerability in the H.323 ALG of Juniper Netwo ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22414 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22413 (An Improper Check or Handling of Exceptional Conditions vulnerability  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22412 (An Improper Locking vulnerability in the SIP ALG of Juniper Networks J ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22411 (An Out-of-Bounds Write vulnerability in Flow Processing Daemon (flowd) ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22410 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22409 (An Unchecked Input for Loop Condition vulnerability in a NAT library o ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22408 (An Improper Validation of Array Index vulnerability in the SIP ALG of  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22407 (An Incomplete Cleanup vulnerability in the Routing Protocol Daemon (rp ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22406 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22405 (An Improper Preservation of Consistency Between Independent Representa ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22404 (An Out-of-bounds Write vulnerability in the Internet Key Exchange Prot ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22403 (An Allocation of Resources Without Limits or Throttling vulnerability  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22402 (A Use After Free vulnerability in the kernel of Juniper Networks Junos ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22401 (An Improper Validation of Array Index vulnerability in the Advanced Fo ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22400 (An Uncontrolled Resource Consumption vulnerability in the PFE manageme ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22399 (When sFlow is enabled and it monitors a packet forwarded via ECMP, a b ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22398 (An Access of Uninitialized Pointer vulnerability in the Routing Protoc ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22397 (An Allocation of Resources Without Limits or Throttling weakness in th ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22396 (An Uncontrolled Resource Consumption vulnerability in TCP processing o ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22395 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22394 (An Improper Handling of Unexpected Data Type vulnerability in the hand ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22393 (An Improper Check for Unusual or Exceptional Conditions vulnerability  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22392
 	RESERVED
 CVE-2023-22391 (A vulnerability in class-of-service (CoS) queue management in Juniper  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-22366
 	RESERVED
 CVE-2023-22357



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/691f6df327928f6962013977f1c0e90162ceef6c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/691f6df327928f6962013977f1c0e90162ceef6c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230113/90f02337/attachment.htm>


More information about the debian-security-tracker-commits mailing list