[Git][security-tracker-team/security-tracker][master] NFUs
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Fri Jan 13 10:18:08 GMT 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
691f6df3 by Moritz Muehlenhoff at 2023-01-13T11:17:43+01:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -4134,59 +4134,59 @@ CVE-2020-36635 (A vulnerability was found in OpenMRS Appointment Scheduling Modu
CVE-2019-25091 (A vulnerability classified as problematic has been found in nsupdate.i ...)
NOT-FOR-US: nsupdate.info
CVE-2023-22417 (A Missing Release of Memory after Effective Lifetime vulnerability in ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22416 (A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos O ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22415 (An Out-of-Bounds Write vulnerability in the H.323 ALG of Juniper Netwo ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22414 (A Missing Release of Memory after Effective Lifetime vulnerability in ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22413 (An Improper Check or Handling of Exceptional Conditions vulnerability ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22412 (An Improper Locking vulnerability in the SIP ALG of Juniper Networks J ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22411 (An Out-of-Bounds Write vulnerability in Flow Processing Daemon (flowd) ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22410 (A Missing Release of Memory after Effective Lifetime vulnerability in ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22409 (An Unchecked Input for Loop Condition vulnerability in a NAT library o ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22408 (An Improper Validation of Array Index vulnerability in the SIP ALG of ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22407 (An Incomplete Cleanup vulnerability in the Routing Protocol Daemon (rp ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22406 (A Missing Release of Memory after Effective Lifetime vulnerability in ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22405 (An Improper Preservation of Consistency Between Independent Representa ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22404 (An Out-of-bounds Write vulnerability in the Internet Key Exchange Prot ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22403 (An Allocation of Resources Without Limits or Throttling vulnerability ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22402 (A Use After Free vulnerability in the kernel of Juniper Networks Junos ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22401 (An Improper Validation of Array Index vulnerability in the Advanced Fo ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22400 (An Uncontrolled Resource Consumption vulnerability in the PFE manageme ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22399 (When sFlow is enabled and it monitors a packet forwarded via ECMP, a b ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22398 (An Access of Uninitialized Pointer vulnerability in the Routing Protoc ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22397 (An Allocation of Resources Without Limits or Throttling weakness in th ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22396 (An Uncontrolled Resource Consumption vulnerability in TCP processing o ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22395 (A Missing Release of Memory after Effective Lifetime vulnerability in ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22394 (An Improper Handling of Unexpected Data Type vulnerability in the hand ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22393 (An Improper Check for Unusual or Exceptional Conditions vulnerability ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22392
RESERVED
CVE-2023-22391 (A vulnerability in class-of-service (CoS) queue management in Juniper ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2023-22366
RESERVED
CVE-2023-22357
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/691f6df327928f6962013977f1c0e90162ceef6c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/691f6df327928f6962013977f1c0e90162ceef6c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230113/90f02337/attachment.htm>
More information about the debian-security-tracker-commits
mailing list