Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5b316b69 by security tracker role at 2022-02-03T20:10:21+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,47 @@
+CVE-2022-24399
+       RESERVED
+CVE-2022-24398
+       RESERVED
+CVE-2022-24397
+       RESERVED
+CVE-2022-24396
+       RESERVED
+CVE-2022-24395
+       RESERVED
+CVE-2022-24394
+       RESERVED
+CVE-2022-24393
+       RESERVED
+CVE-2022-24392
+       RESERVED
+CVE-2022-24391
+       RESERVED
+CVE-2022-24390
+       RESERVED
+CVE-2022-24389
+       RESERVED
+CVE-2022-24388
+       RESERVED
+CVE-2022-24387
+       RESERVED
+CVE-2022-24386
+       RESERVED
+CVE-2022-24385
+       RESERVED
+CVE-2022-24384
+       RESERVED
+CVE-2022-21241
+       RESERVED
+CVE-2022-0486
+       RESERVED
+CVE-2022-0485
+       RESERVED
+CVE-2022-0484
+       RESERVED
+CVE-2022-0483
+       RESERVED
+CVE-2022-0482
+       RESERVED
 CVE-2022-24372
        RESERVED
 CVE-2022-24371
@@ -166,8 +210,8 @@ CVE-2022-0473
        RESERVED
 CVE-2022-24308
        RESERVED
-CVE-2022-24307
-       RESERVED
+CVE-2022-24307 (Mastodon before 3.3.2 and 3.4.x before 3.4.6 has incorrect 
access cont ...)
+       TODO: check
 CVE-2022-24306
        RESERVED
 CVE-2022-24305
@@ -2808,12 +2852,12 @@ CVE-2022-23571
        RESERVED
 CVE-2022-23570
        RESERVED
-CVE-2022-23569
-       RESERVED
-CVE-2022-23568
-       RESERVED
-CVE-2022-23567
-       RESERVED
+CVE-2022-23569 (Tensorflow is an Open Source Machine Learning Framework. 
Multiple oper ...)
+       TODO: check
+CVE-2022-23568 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-23567 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
 CVE-2022-23566
        RESERVED
 CVE-2022-23565
@@ -9760,16 +9804,19 @@ CVE-2021-45345
 CVE-2021-45344
        RESERVED
 CVE-2021-45343 (In LibreCAD 2.2.0, a NULL pointer dereference in the HATCH 
handling of ...)
+       {DLA-2908-1}
        - librecad 2.1.3-3 (bug #1004518)
        NOTE: https://github.com/LibreCAD/LibreCAD/issues/1468
        NOTE: https://github.com/LibreCAD/LibreCAD/pull/1469
        NOTE: Fixed by: 
https://github.com/LibreCAD/LibreCAD/commit/5771425808bd16e78e1c6f28728c0712c47316f7
 CVE-2021-45342 (A buffer overflow vulnerability in CDataList of the jwwlib 
component o ...)
+       {DLA-2908-1}
        - librecad 2.1.3-3 (bug #1004518)
        NOTE: https://github.com/LibreCAD/LibreCAD/issues/1464
        NOTE: https://github.com/LibreCAD/LibreCAD/pull/1465
        NOTE: Fixed by: 
https://github.com/LibreCAD/LibreCAD/commit/4edcbe72679f95cb60979c77a348c1522a20b0f4
 CVE-2021-45341 (A buffer overflow vulnerability in CDataMoji of the jwwlib 
component o ...)
+       {DLA-2908-1}
        - librecad 2.1.3-3 (bug #1004518)
        NOTE: https://github.com/LibreCAD/LibreCAD/issues/1462
        NOTE: https://github.com/LibreCAD/LibreCAD/pull/1463
@@ -10695,7 +10742,7 @@ CVE-2021-45081
 CVE-2021-45080
        RESERVED
 CVE-2021-45079 (In strongSwan before 5.9.5, a malicious responder can send an 
EAP-Succ ...)
-       {DSA-5056-1}
+       {DSA-5056-1 DLA-2909-1}
        - strongswan 5.9.5-1
        NOTE: 
https://www.strongswan.org/blog/2022/01/24/strongswan-vulnerability-(cve-2021-45079).html
        NOTE: Patches: https://download.strongswan.org/security/CVE-2021-45079/
@@ -11454,8 +11501,8 @@ CVE-2021-44868
        RESERVED
 CVE-2021-44867
        RESERVED
-CVE-2021-44866
-       RESERVED
+CVE-2021-44866 (An issue was discovered in Online-Movie-Ticket-Booking-System 
1.0. The ...)
+       TODO: check
 CVE-2021-44865
        RESERVED
 CVE-2021-44864
@@ -14324,40 +14371,40 @@ CVE-2021-3968 (vim is vulnerable to Heap-based Buffer 
Overflow ...)
        [stretch] - vim <not-affected> (Vulnerable code not present)
        NOTE: https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528/
        NOTE: 
https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69 
(v8.2.3610)
-CVE-2022-21741
-       RESERVED
-CVE-2022-21740
-       RESERVED
-CVE-2022-21739
-       RESERVED
-CVE-2022-21738
-       RESERVED
-CVE-2022-21737
-       RESERVED
-CVE-2022-21736
-       RESERVED
-CVE-2022-21735
-       RESERVED
-CVE-2022-21734
-       RESERVED
-CVE-2022-21733
-       RESERVED
-CVE-2022-21732
-       RESERVED
-CVE-2022-21731
-       RESERVED
-CVE-2022-21730
-       RESERVED
-CVE-2022-21729
-       RESERVED
-CVE-2022-21728
-       RESERVED
-CVE-2022-21727
-       RESERVED
-CVE-2022-21726
-       RESERVED
-CVE-2022-21725
-       RESERVED
+CVE-2022-21741 (Tensorflow is an Open Source Machine Learning Framework. ### 
Impact An ...)
+       TODO: check
+CVE-2022-21740 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21739 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21738 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21737 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21736 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21735 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21734 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21733 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21732 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21731 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21730 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21729 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21728 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21727 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21726 (Tensorflow is an Open Source Machine Learning Framework. The 
implement ...)
+       TODO: check
+CVE-2022-21725 (Tensorflow is an Open Source Machine Learning Framework. The 
estimator ...)
+       TODO: check
 CVE-2022-21724 (pgjdbc is the offical PostgreSQL JDBC Driver. A security hole 
was foun ...)
        TODO: check
 CVE-2022-21723 (PJSIP is a free and open source multimedia communication 
library writt ...)
@@ -22953,7 +23000,7 @@ CVE-2021-41821 (Wazuh Manager in Wazuh through 4.1.5 is 
affected by a remote Int
 CVE-2021-41820
        RESERVED
 CVE-2021-41819 (CGI::Cookie.parse in Ruby through 2.6.8 mishandles security 
prefixes i ...)
-       {DLA-2853-1}
+       {DSA-5067-1 DSA-5066-1 DLA-2853-1}
        - ruby3.0 <unfixed> (bug #1002995)
        - ruby2.7 2.7.5-1
        - ruby2.5 <removed>
@@ -22964,7 +23011,7 @@ CVE-2021-41819 (CGI::Cookie.parse in Ruby through 2.6.8 
mishandles security pref
 CVE-2021-41818
        RESERVED
 CVE-2021-41817 (Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS 
(regula ...)
-       {DLA-2853-1}
+       {DSA-5067-1 DSA-5066-1 DLA-2853-1}
        - ruby3.0 <unfixed> (bug #1002995)
        - ruby2.7 2.7.5-1
        - ruby2.5 <removed>
@@ -22977,6 +23024,7 @@ CVE-2021-41817 (Date.parse in the date gem through 
3.2.0 for Ruby allows ReDoS (
        NOTE: 
https://github.com/ruby/date/commit/376c65942bd1d81803f14d37351737df60ec4664 
(v3.2.2)
 CVE-2021-41816 [Buffer Overrun in CGI.escape_html]
        RESERVED
+       {DSA-5067-1}
        - ruby3.0 <unfixed> (bug #1002995)
        - ruby2.7 2.7.5-1
        - ruby2.5 <not-affected> (Vulnerable code introduced later)
@@ -46854,7 +46902,7 @@ CVE-2021-32068 (The AWV and MiCollab Client Service 
components in Mitel MiCollab
 CVE-2021-32067 (The MiCollab Client Service component in Mitel MiCollab before 
9.3 cou ...)
        NOT-FOR-US: Mitel
 CVE-2021-32066 (An issue was discovered in Ruby through 2.6.7, 2.7.x through 
2.7.3, an ...)
-       {DLA-2780-1}
+       {DSA-5066-1 DLA-2780-1}
        - ruby2.7 2.7.4-1 (bug #990815)
        - ruby2.5 <removed>
        - ruby2.3 <removed>
@@ -47772,7 +47820,7 @@ CVE-2021-31811 (In Apache PDFBox, a carefully crafted 
PDF file can trigger an Ou
        NOTE: https://www.openwall.com/lists/oss-security/2021/06/12/2
        NOTE: 
https://github.com/apache/pdfbox/commit/cd17a19e9ab1028dc662e972dd8dbb3fa68b4a33
 CVE-2021-31810 (An issue was discovered in Ruby through 2.6.7, 2.7.x through 
2.7.3, an ...)
-       {DLA-2780-1}
+       {DSA-5066-1 DLA-2780-1}
        - ruby2.7 2.7.4-1 (bug #990815)
        - ruby2.5 <removed>
        - ruby2.3 <removed>
@@ -47833,7 +47881,7 @@ CVE-2021-31800 (Multiple path traversal vulnerabilities 
exist in smbserver.py in
        [stretch] - impacket <no-dsa> (Minor issue)
        NOTE: 
https://github.com/SecureAuthCorp/impacket/commit/49c643bf66620646884ed141c94e5fdd85bcdd2f
 CVE-2021-31799 (In RDoc 3.11 through 6.x before 6.3.1, as distributed with 
Ruby throug ...)
-       {DLA-2780-1}
+       {DSA-5066-1 DLA-2780-1}
        - ruby2.7 2.7.4-1 (bug #990815)
        - ruby2.5 <removed>
        - ruby2.3 <removed>
@@ -55221,6 +55269,7 @@ CVE-2021-28966 (In Ruby through 3.0 on Windows, a 
remote attacker can submit a c
        - ruby2.7 <not-affected> (Windows-specific)
        NOTE: https://hackerone.com/reports/1131465
 CVE-2021-28965 (The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 
2.7.3, a ...)
+       {DSA-5066-1}
        - ruby2.7 2.7.3-1 (bug #986807)
        - ruby2.5 <removed>
        - ruby2.3 <removed>



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5b316b69108cadcadf3e91695fcc735a042dda45

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5b316b69108cadcadf3e91695fcc735a042dda45
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to