[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Mar 4 20:10:50 GMT 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
e2fa5346 by security tracker role at 2023-03-04T20:10:39+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,37 @@
+CVE-2023-27604
+ RESERVED
+CVE-2023-27603
+ RESERVED
+CVE-2023-27602
+ RESERVED
+CVE-2023-1177
+ RESERVED
+CVE-2023-1176
+ RESERVED
+CVE-2023-1175 (Incorrect Calculation of Buffer Size in GitHub repository vim/vim prio ...)
+ TODO: check
+CVE-2022-4930
+ RESERVED
+CVE-2017-20181
+ RESERVED
+CVE-2017-20180
+ RESERVED
+CVE-2015-10095
+ RESERVED
+CVE-2015-10094
+ RESERVED
+CVE-2015-10093
+ RESERVED
+CVE-2015-10092
+ RESERVED
+CVE-2015-10091
+ RESERVED
+CVE-2015-10090
+ RESERVED
+CVE-2014-125092
+ RESERVED
+CVE-2006-10001
+ RESERVED
CVE-2023-27601
RESERVED
CVE-2023-27600
@@ -206,8 +240,8 @@ CVE-2021-4328 (A vulnerability has been found in 狮子鱼CMS and
TODO: check
CVE-2020-36665
RESERVED
-CVE-2020-36664
- RESERVED
+CVE-2020-36664 (A vulnerability has been found in Artesãos SEOTools up to 0.17.1 ...)
+ TODO: check
CVE-2020-36663 (A vulnerability, which was classified as problematic, was found in Art ...)
TODO: check
CVE-2023-27539
@@ -6387,7 +6421,7 @@ CVE-2023-25223
CVE-2023-25222 (A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12 ...)
- libredwg <itp> (bug #595191)
CVE-2023-25221 (Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vuln ...)
- {DSA-5346-1}
+ {DSA-5346-1 DLA-3352-1}
- libde265 1.0.11-1
NOTE: https://github.com/strukturag/libde265/issues/388
NOTE: https://github.com/strukturag/libde265/commit/857290982330e82d9e25d9d39527c6737021aa7d (v1.0.11)
@@ -7671,39 +7705,39 @@ CVE-2023-24760
CVE-2023-24759
RESERVED
CVE-2023-24758 (libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...)
- {DSA-5346-1}
+ {DSA-5346-1 DLA-3352-1}
- libde265 1.0.11-1
NOTE: https://github.com/strukturag/libde265/issues/383
NOTE: https://github.com/strukturag/libde265/commit/bfb6de155f9fb015d2904cb4ef07809f17995276 (v1.0.11)
CVE-2023-24757 (libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...)
- {DSA-5346-1}
+ {DSA-5346-1 DLA-3352-1}
- libde265 1.0.11-1
NOTE: https://github.com/strukturag/libde265/issues/385
NOTE: https://github.com/strukturag/libde265/commit/48eb7dafe204b825b4a62948ed171a0cd3f1bda2 (v1.0.11)
CVE-2023-24756 (libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...)
- {DSA-5346-1}
+ {DSA-5346-1 DLA-3352-1}
- libde265 1.0.11-1
NOTE: https://github.com/strukturag/libde265/issues/380
NOTE: https://github.com/strukturag/libde265/commit/48eb7dafe204b825b4a62948ed171a0cd3f1bda2 (v1.0.11)
CVE-2023-24755 (libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...)
- {DSA-5346-1}
+ {DSA-5346-1 DLA-3352-1}
- libde265 1.0.11-1
NOTE: https://github.com/strukturag/libde265/issues/384
NOTE: https://github.com/strukturag/libde265/commit/48eb7dafe204b825b4a62948ed171a0cd3f1bda2 (v1.0.11)
CVE-2023-24754 (libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...)
- {DSA-5346-1}
+ {DSA-5346-1 DLA-3352-1}
- libde265 1.0.11-1
NOTE: https://github.com/strukturag/libde265/issues/382
NOTE: https://github.com/strukturag/libde265/commit/bfb6de155f9fb015d2904cb4ef07809f17995276 (v1.0.11)
CVE-2023-24753
RESERVED
CVE-2023-24752 (libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...)
- {DSA-5346-1}
+ {DSA-5346-1 DLA-3352-1}
- libde265 1.0.11-1
NOTE: https://github.com/strukturag/libde265/issues/378
NOTE: https://github.com/strukturag/libde265/commit/052bacb2535cf0024042eefde58e48df2c778f7c (v1.0.11)
CVE-2023-24751 (libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...)
- {DSA-5346-1}
+ {DSA-5346-1 DLA-3352-1}
- libde265 1.0.11-1
NOTE: https://github.com/strukturag/libde265/issues/379
NOTE: https://github.com/strukturag/libde265/commit/7ea8e3cbb010bc02fa38419e87ed2281d7933850 (v1.0.11)
@@ -239207,7 +239241,7 @@ CVE-2019-19922 (kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.c
[buster] - linux 4.19.87-1
[stretch] - linux <not-affected> (Vulnerability introduced later)
NOTE: https://git.kernel.org/linus/de53fd7aedb100f03e5d2231cfce0e4993282425
-CVE-2023-27561
+CVE-2023-27561 (runc through 1.1.4 has Incorrect Access Control leading to Escalation ...)
- runc <unfixed>
NOTE: https://github.com/opencontainers/runc/issues/3751
NOTE: https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e2fa53469782442bec04ef213239d261adf958e0
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e2fa53469782442bec04ef213239d261adf958e0
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230304/07aa5e5e/attachment.htm>
More information about the debian-security-tracker-commits
mailing list