Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
883d6e32 by security tracker role at 2020-09-24T08:10:17+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,425 @@
+CVE-2020-26061
+       RESERVED
+CVE-2020-26060
+       RESERVED
+CVE-2020-26059
+       RESERVED
+CVE-2020-26058
+       RESERVED
+CVE-2020-26057
+       RESERVED
+CVE-2020-26056
+       RESERVED
+CVE-2020-26055
+       RESERVED
+CVE-2020-26054
+       RESERVED
+CVE-2020-26053
+       RESERVED
+CVE-2020-26052
+       RESERVED
+CVE-2020-26051
+       RESERVED
+CVE-2020-26050
+       RESERVED
+CVE-2020-26049
+       RESERVED
+CVE-2020-26048
+       RESERVED
+CVE-2020-26047
+       RESERVED
+CVE-2020-26046
+       RESERVED
+CVE-2020-26045
+       RESERVED
+CVE-2020-26044
+       RESERVED
+CVE-2020-26043
+       RESERVED
+CVE-2020-26042
+       RESERVED
+CVE-2020-26041
+       RESERVED
+CVE-2020-26040
+       RESERVED
+CVE-2020-26039
+       RESERVED
+CVE-2020-26038
+       RESERVED
+CVE-2020-26037
+       RESERVED
+CVE-2020-26036
+       RESERVED
+CVE-2020-26035
+       RESERVED
+CVE-2020-26034
+       RESERVED
+CVE-2020-26033
+       RESERVED
+CVE-2020-26032
+       RESERVED
+CVE-2020-26031
+       RESERVED
+CVE-2020-26030
+       RESERVED
+CVE-2020-26029
+       RESERVED
+CVE-2020-26028
+       RESERVED
+CVE-2020-26027
+       RESERVED
+CVE-2020-26026
+       RESERVED
+CVE-2020-26025
+       RESERVED
+CVE-2020-26024
+       RESERVED
+CVE-2020-26023
+       RESERVED
+CVE-2020-26022
+       RESERVED
+CVE-2020-26021
+       RESERVED
+CVE-2020-26020
+       RESERVED
+CVE-2020-26019
+       RESERVED
+CVE-2020-26018
+       RESERVED
+CVE-2020-26017
+       RESERVED
+CVE-2020-26016
+       RESERVED
+CVE-2020-26015
+       RESERVED
+CVE-2020-26014
+       RESERVED
+CVE-2020-26013
+       RESERVED
+CVE-2020-26012
+       RESERVED
+CVE-2020-26011
+       RESERVED
+CVE-2020-26010
+       RESERVED
+CVE-2020-26009
+       RESERVED
+CVE-2020-26008
+       RESERVED
+CVE-2020-26007
+       RESERVED
+CVE-2020-26006
+       RESERVED
+CVE-2020-26005
+       RESERVED
+CVE-2020-26004
+       RESERVED
+CVE-2020-26003
+       RESERVED
+CVE-2020-26002
+       RESERVED
+CVE-2020-26001
+       RESERVED
+CVE-2020-26000
+       RESERVED
+CVE-2020-25999
+       RESERVED
+CVE-2020-25998
+       RESERVED
+CVE-2020-25997
+       RESERVED
+CVE-2020-25996
+       RESERVED
+CVE-2020-25995
+       RESERVED
+CVE-2020-25994
+       RESERVED
+CVE-2020-25993
+       RESERVED
+CVE-2020-25992
+       RESERVED
+CVE-2020-25991
+       RESERVED
+CVE-2020-25990
+       RESERVED
+CVE-2020-25989
+       RESERVED
+CVE-2020-25988
+       RESERVED
+CVE-2020-25987
+       RESERVED
+CVE-2020-25986
+       RESERVED
+CVE-2020-25985
+       RESERVED
+CVE-2020-25984
+       RESERVED
+CVE-2020-25983
+       RESERVED
+CVE-2020-25982
+       RESERVED
+CVE-2020-25981
+       RESERVED
+CVE-2020-25980
+       RESERVED
+CVE-2020-25979
+       RESERVED
+CVE-2020-25978
+       RESERVED
+CVE-2020-25977
+       RESERVED
+CVE-2020-25976
+       RESERVED
+CVE-2020-25975
+       RESERVED
+CVE-2020-25974
+       RESERVED
+CVE-2020-25973
+       RESERVED
+CVE-2020-25972
+       RESERVED
+CVE-2020-25971
+       RESERVED
+CVE-2020-25970
+       RESERVED
+CVE-2020-25969
+       RESERVED
+CVE-2020-25968
+       RESERVED
+CVE-2020-25967
+       RESERVED
+CVE-2020-25966
+       RESERVED
+CVE-2020-25965
+       RESERVED
+CVE-2020-25964
+       RESERVED
+CVE-2020-25963
+       RESERVED
+CVE-2020-25962
+       RESERVED
+CVE-2020-25961
+       RESERVED
+CVE-2020-25960
+       RESERVED
+CVE-2020-25959
+       RESERVED
+CVE-2020-25958
+       RESERVED
+CVE-2020-25957
+       RESERVED
+CVE-2020-25956
+       RESERVED
+CVE-2020-25955
+       RESERVED
+CVE-2020-25954
+       RESERVED
+CVE-2020-25953
+       RESERVED
+CVE-2020-25952
+       RESERVED
+CVE-2020-25951
+       RESERVED
+CVE-2020-25950
+       RESERVED
+CVE-2020-25949
+       RESERVED
+CVE-2020-25948
+       RESERVED
+CVE-2020-25947
+       RESERVED
+CVE-2020-25946
+       RESERVED
+CVE-2020-25945
+       RESERVED
+CVE-2020-25944
+       RESERVED
+CVE-2020-25943
+       RESERVED
+CVE-2020-25942
+       RESERVED
+CVE-2020-25941
+       RESERVED
+CVE-2020-25940
+       RESERVED
+CVE-2020-25939
+       RESERVED
+CVE-2020-25938
+       RESERVED
+CVE-2020-25937
+       RESERVED
+CVE-2020-25936
+       RESERVED
+CVE-2020-25935
+       RESERVED
+CVE-2020-25934
+       RESERVED
+CVE-2020-25933
+       RESERVED
+CVE-2020-25932
+       RESERVED
+CVE-2020-25931
+       RESERVED
+CVE-2020-25930
+       RESERVED
+CVE-2020-25929
+       RESERVED
+CVE-2020-25928
+       RESERVED
+CVE-2020-25927
+       RESERVED
+CVE-2020-25926
+       RESERVED
+CVE-2020-25925
+       RESERVED
+CVE-2020-25924
+       RESERVED
+CVE-2020-25923
+       RESERVED
+CVE-2020-25922
+       RESERVED
+CVE-2020-25921
+       RESERVED
+CVE-2020-25920
+       RESERVED
+CVE-2020-25919
+       RESERVED
+CVE-2020-25918
+       RESERVED
+CVE-2020-25917
+       RESERVED
+CVE-2020-25916
+       RESERVED
+CVE-2020-25915
+       RESERVED
+CVE-2020-25914
+       RESERVED
+CVE-2020-25913
+       RESERVED
+CVE-2020-25912
+       RESERVED
+CVE-2020-25911
+       RESERVED
+CVE-2020-25910
+       RESERVED
+CVE-2020-25909
+       RESERVED
+CVE-2020-25908
+       RESERVED
+CVE-2020-25907
+       RESERVED
+CVE-2020-25906
+       RESERVED
+CVE-2020-25905
+       RESERVED
+CVE-2020-25904
+       RESERVED
+CVE-2020-25903
+       RESERVED
+CVE-2020-25902
+       RESERVED
+CVE-2020-25901
+       RESERVED
+CVE-2020-25900
+       RESERVED
+CVE-2020-25899
+       RESERVED
+CVE-2020-25898
+       RESERVED
+CVE-2020-25897
+       RESERVED
+CVE-2020-25896
+       RESERVED
+CVE-2020-25895
+       RESERVED
+CVE-2020-25894
+       RESERVED
+CVE-2020-25893
+       RESERVED
+CVE-2020-25892
+       RESERVED
+CVE-2020-25891
+       RESERVED
+CVE-2020-25890
+       RESERVED
+CVE-2020-25889
+       RESERVED
+CVE-2020-25888
+       RESERVED
+CVE-2020-25887
+       RESERVED
+CVE-2020-25886
+       RESERVED
+CVE-2020-25885
+       RESERVED
+CVE-2020-25884
+       RESERVED
+CVE-2020-25883
+       RESERVED
+CVE-2020-25882
+       RESERVED
+CVE-2020-25881
+       RESERVED
+CVE-2020-25880
+       RESERVED
+CVE-2020-25879
+       RESERVED
+CVE-2020-25878
+       RESERVED
+CVE-2020-25877
+       RESERVED
+CVE-2020-25876
+       RESERVED
+CVE-2020-25875
+       RESERVED
+CVE-2020-25874
+       RESERVED
+CVE-2020-25873
+       RESERVED
+CVE-2020-25872
+       RESERVED
+CVE-2020-25871
+       RESERVED
+CVE-2020-25870
+       RESERVED
+CVE-2020-25869
+       RESERVED
+CVE-2020-25868
+       RESERVED
+CVE-2020-25867
+       RESERVED
+CVE-2020-25866
+       RESERVED
+CVE-2020-25865
+       RESERVED
+CVE-2020-25864
+       RESERVED
+CVE-2020-25863
+       RESERVED
+CVE-2020-25862
+       RESERVED
+CVE-2020-25861
+       RESERVED
+CVE-2020-25860
+       RESERVED
+CVE-2020-25859
+       RESERVED
+CVE-2020-25858
+       RESERVED
+CVE-2020-25857
+       RESERVED
+CVE-2020-25856
+       RESERVED
+CVE-2020-25855
+       RESERVED
+CVE-2020-25854
+       RESERVED
+CVE-2020-25853
+       RESERVED
+CVE-2020-25852
+       RESERVED
+CVE-2020-25851
+       RESERVED
 CVE-2020-25850
        RESERVED
 CVE-2020-25849
@@ -539,53 +961,43 @@ CVE-2020-25606
        RESERVED
 CVE-2020-25605
        RESERVED
-CVE-2020-25604 [race when migrating timers between x86 HVM vCPU-s]
-       RESERVED
+CVE-2020-25604 (An issue was discovered in Xen through 4.14.x. There is a race 
conditi ...)
        - xen <unfixed>
        [stretch] - xen <end-of-life> (DSA 4602-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-336.html
-CVE-2020-25603 [Missing memory barriers when accessing/allocating an event 
channel]
-       RESERVED
+CVE-2020-25603 (An issue was discovered in Xen through 4.14.x. There are 
missing memor ...)
        - xen <unfixed>
        [stretch] - xen <end-of-life> (DSA 4602-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-340.html
-CVE-2020-25602 [x86 pv: Crash when handling guest access to MSR_MISC_ENABLE]
-       RESERVED
+CVE-2020-25602 (An issue was discovered in Xen through 4.14.x. An x86 PV guest 
can tri ...)
        - xen <unfixed>
        [stretch] - xen <end-of-life> (DSA 4602-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-333.html
-CVE-2020-25601 [lack of preemption in evtchn_reset() / evtchn_destroy()]
-       RESERVED
+CVE-2020-25601 (An issue was discovered in Xen through 4.14.x. There is a lack 
of pree ...)
        - xen <unfixed>
        [stretch] - xen <end-of-life> (DSA 4602-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-344.html
-CVE-2020-25600 [out of bounds event channels available to 32-bit x86 domains]
-       RESERVED
+CVE-2020-25600 (An issue was discovered in Xen through 4.14.x. Out of bounds 
event cha ...)
        - xen <unfixed>
        [stretch] - xen <end-of-life> (DSA 4602-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-342.html
-CVE-2020-25599 [races with evtchn_reset()]
-       RESERVED
+CVE-2020-25599 (An issue was discovered in Xen through 4.14.x. There are 
evtchn_reset( ...)
        - xen <unfixed>
        [stretch] - xen <end-of-life> (DSA 4602-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-343.html
-CVE-2020-25598 [Missing unlock in XENMEM_acquire_resource error path]
-       RESERVED
+CVE-2020-25598 (An issue was discovered in Xen 4.14.x. There is a missing 
unlock in th ...)
        [experimental] - xen <unfixed>
        - xen <not-affected> (No affected version (only > 4.12) ever uploaded 
to unstable)
        NOTE: https://xenbits.xen.org/xsa/advisory-334.html
-CVE-2020-25597 [once valid event channels may not turn invalid]
-       RESERVED
+CVE-2020-25597 (An issue was discovered in Xen through 4.14.x. There is 
mishandling of ...)
        - xen <unfixed>
        [stretch] - xen <end-of-life> (DSA 4602-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-338.html
-CVE-2020-25596 [x86 pv guest kernel DoS via SYSENTER]
-       RESERVED
+CVE-2020-25596 (An issue was discovered in Xen through 4.14.x. x86 PV guest 
kernels ca ...)
        - xen <unfixed>
        [stretch] - xen <end-of-life> (DSA 4602-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-339.html
-CVE-2020-25595 [PCI passthrough code reading back hardware registers]
-       RESERVED
+CVE-2020-25595 (An issue was discovered in Xen through 4.14.x. The PCI 
passthrough cod ...)
        - xen <unfixed>
        [stretch] - xen <end-of-life> (DSA 4602-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-337.html
@@ -2824,8 +3236,8 @@ CVE-2020-24562
        RESERVED
 CVE-2020-24561 (A command injection vulnerability in Trend Micro ServerProtect 
for Lin ...)
        NOT-FOR-US: Trend Micro
-CVE-2020-24560
-       RESERVED
+CVE-2020-24560 (An incomplete SSL server certification validation 
vulnerability in the ...)
+       TODO: check
 CVE-2020-24559 (A vulnerability in Trend Micro Apex One on macOS may allow an 
attacker ...)
        NOT-FOR-US: Trend Micro
 CVE-2020-24558 (A vulnerability in an Trend Micro Apex One dll may allow an 
attacker t ...)
@@ -21276,8 +21688,8 @@ CVE-2020-15606 (This vulnerability allows remote 
attackers to execute arbitrary
        NOT-FOR-US: CentOS-WebPanel.com
 CVE-2020-15605 (If LDAP authentication is enabled, an LDAP authentication 
bypass vulne ...)
        NOT-FOR-US: Trend Micro
-CVE-2020-15604
-       RESERVED
+CVE-2020-15604 (An incomplete SSL server certification validation 
vulnerability in the ...)
+       TODO: check
 CVE-2020-15603 (An invalid memory read vulnerability in a Trend Micro Secuity 
2020 (v1 ...)
        NOT-FOR-US: Trend Micro
 CVE-2020-15602 (An untrusted search path remote code execution (RCE) 
vulnerability in  ...)
@@ -266886,8 +267298,8 @@ CVE-2015-4721 (Multiple cross-site scripting (XSS) 
vulnerabilities in Concrete5
        NOT-FOR-US: Concrete5
 CVE-2015-4720
        REJECTED
-CVE-2015-4719
-       RESERVED
+CVE-2015-4719 (The client API authentication mechanism in Pexip Infinity 
before 10 al ...)
+       TODO: check
 CVE-2015-4718 (The external SMB storage driver in ownCloud Server before 
6.0.8, 7.0.x ...)
        {DSA-3373-1}
        - owncloud 7.0.6+dfsg-1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/883d6e32bdb88a44bbcbf0dce237ce57609eb8b6

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/883d6e32bdb88a44bbcbf0dce237ce57609eb8b6
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to