Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
563ac9f8 by security tracker role at 2022-10-03T08:10:13+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,489 @@
+CVE-2022-42251
+       RESERVED
+CVE-2022-42250
+       RESERVED
+CVE-2022-42249
+       RESERVED
+CVE-2022-42248
+       RESERVED
+CVE-2022-42247
+       RESERVED
+CVE-2022-42246
+       RESERVED
+CVE-2022-42245
+       RESERVED
+CVE-2022-42244
+       RESERVED
+CVE-2022-42243
+       RESERVED
+CVE-2022-42242
+       RESERVED
+CVE-2022-42241
+       RESERVED
+CVE-2022-42240
+       RESERVED
+CVE-2022-42239
+       RESERVED
+CVE-2022-42238
+       RESERVED
+CVE-2022-42237
+       RESERVED
+CVE-2022-42236
+       RESERVED
+CVE-2022-42235
+       RESERVED
+CVE-2022-42234
+       RESERVED
+CVE-2022-42233
+       RESERVED
+CVE-2022-42232
+       RESERVED
+CVE-2022-42231
+       RESERVED
+CVE-2022-42230
+       RESERVED
+CVE-2022-42229
+       RESERVED
+CVE-2022-42228
+       RESERVED
+CVE-2022-42227
+       RESERVED
+CVE-2022-42226
+       RESERVED
+CVE-2022-42225
+       RESERVED
+CVE-2022-42224
+       RESERVED
+CVE-2022-42223
+       RESERVED
+CVE-2022-42222
+       RESERVED
+CVE-2022-42221
+       RESERVED
+CVE-2022-42220
+       RESERVED
+CVE-2022-42219
+       RESERVED
+CVE-2022-42218
+       RESERVED
+CVE-2022-42217
+       RESERVED
+CVE-2022-42216
+       RESERVED
+CVE-2022-42215
+       RESERVED
+CVE-2022-42214
+       RESERVED
+CVE-2022-42213
+       RESERVED
+CVE-2022-42212
+       RESERVED
+CVE-2022-42211
+       RESERVED
+CVE-2022-42210
+       RESERVED
+CVE-2022-42209
+       RESERVED
+CVE-2022-42208
+       RESERVED
+CVE-2022-42207
+       RESERVED
+CVE-2022-42206
+       RESERVED
+CVE-2022-42205
+       RESERVED
+CVE-2022-42204
+       RESERVED
+CVE-2022-42203
+       RESERVED
+CVE-2022-42202
+       RESERVED
+CVE-2022-42201
+       RESERVED
+CVE-2022-42200
+       RESERVED
+CVE-2022-42199
+       RESERVED
+CVE-2022-42198
+       RESERVED
+CVE-2022-42197
+       RESERVED
+CVE-2022-42196
+       RESERVED
+CVE-2022-42195
+       RESERVED
+CVE-2022-42194
+       RESERVED
+CVE-2022-42193
+       RESERVED
+CVE-2022-42192
+       RESERVED
+CVE-2022-42191
+       RESERVED
+CVE-2022-42190
+       RESERVED
+CVE-2022-42189
+       RESERVED
+CVE-2022-42188
+       RESERVED
+CVE-2022-42187
+       RESERVED
+CVE-2022-42186
+       RESERVED
+CVE-2022-42185
+       RESERVED
+CVE-2022-42184
+       RESERVED
+CVE-2022-42183
+       RESERVED
+CVE-2022-42182
+       RESERVED
+CVE-2022-42181
+       RESERVED
+CVE-2022-42180
+       RESERVED
+CVE-2022-42179
+       RESERVED
+CVE-2022-42178
+       RESERVED
+CVE-2022-42177
+       RESERVED
+CVE-2022-42176
+       RESERVED
+CVE-2022-42175
+       RESERVED
+CVE-2022-42174
+       RESERVED
+CVE-2022-42173
+       RESERVED
+CVE-2022-42172
+       RESERVED
+CVE-2022-42171
+       RESERVED
+CVE-2022-42170
+       RESERVED
+CVE-2022-42169
+       RESERVED
+CVE-2022-42168
+       RESERVED
+CVE-2022-42167
+       RESERVED
+CVE-2022-42166
+       RESERVED
+CVE-2022-42165
+       RESERVED
+CVE-2022-42164
+       RESERVED
+CVE-2022-42163
+       RESERVED
+CVE-2022-42162
+       RESERVED
+CVE-2022-42161
+       RESERVED
+CVE-2022-42160
+       RESERVED
+CVE-2022-42159
+       RESERVED
+CVE-2022-42158
+       RESERVED
+CVE-2022-42157
+       RESERVED
+CVE-2022-42156
+       RESERVED
+CVE-2022-42155
+       RESERVED
+CVE-2022-42154
+       RESERVED
+CVE-2022-42153
+       RESERVED
+CVE-2022-42152
+       RESERVED
+CVE-2022-42151
+       RESERVED
+CVE-2022-42150
+       RESERVED
+CVE-2022-42149
+       RESERVED
+CVE-2022-42148
+       RESERVED
+CVE-2022-42147
+       RESERVED
+CVE-2022-42146
+       RESERVED
+CVE-2022-42145
+       RESERVED
+CVE-2022-42144
+       RESERVED
+CVE-2022-42143
+       RESERVED
+CVE-2022-42142
+       RESERVED
+CVE-2022-42141
+       RESERVED
+CVE-2022-42140
+       RESERVED
+CVE-2022-42139
+       RESERVED
+CVE-2022-42138
+       RESERVED
+CVE-2022-42137
+       RESERVED
+CVE-2022-42136
+       RESERVED
+CVE-2022-42135
+       RESERVED
+CVE-2022-42134
+       RESERVED
+CVE-2022-42133
+       RESERVED
+CVE-2022-42132
+       RESERVED
+CVE-2022-42131
+       RESERVED
+CVE-2022-42130
+       RESERVED
+CVE-2022-42129
+       RESERVED
+CVE-2022-42128
+       RESERVED
+CVE-2022-42127
+       RESERVED
+CVE-2022-42126
+       RESERVED
+CVE-2022-42125
+       RESERVED
+CVE-2022-42124
+       RESERVED
+CVE-2022-42123
+       RESERVED
+CVE-2022-42122
+       RESERVED
+CVE-2022-42121
+       RESERVED
+CVE-2022-42120
+       RESERVED
+CVE-2022-42119
+       RESERVED
+CVE-2022-42118
+       RESERVED
+CVE-2022-42117
+       RESERVED
+CVE-2022-42116
+       RESERVED
+CVE-2022-42115
+       RESERVED
+CVE-2022-42114
+       RESERVED
+CVE-2022-42113
+       RESERVED
+CVE-2022-42112
+       RESERVED
+CVE-2022-42111
+       RESERVED
+CVE-2022-42110
+       RESERVED
+CVE-2022-42109
+       RESERVED
+CVE-2022-42108
+       RESERVED
+CVE-2022-42107
+       RESERVED
+CVE-2022-42106
+       RESERVED
+CVE-2022-42105
+       RESERVED
+CVE-2022-42104
+       RESERVED
+CVE-2022-42103
+       RESERVED
+CVE-2022-42102
+       RESERVED
+CVE-2022-42101
+       RESERVED
+CVE-2022-42100
+       RESERVED
+CVE-2022-42099
+       RESERVED
+CVE-2022-42098
+       RESERVED
+CVE-2022-42097
+       RESERVED
+CVE-2022-42096
+       RESERVED
+CVE-2022-42095
+       RESERVED
+CVE-2022-42094
+       RESERVED
+CVE-2022-42093
+       RESERVED
+CVE-2022-42092
+       RESERVED
+CVE-2022-42091
+       RESERVED
+CVE-2022-42090
+       RESERVED
+CVE-2022-42089
+       RESERVED
+CVE-2022-42088
+       RESERVED
+CVE-2022-42087
+       RESERVED
+CVE-2022-42086
+       RESERVED
+CVE-2022-42085
+       RESERVED
+CVE-2022-42084
+       RESERVED
+CVE-2022-42083
+       RESERVED
+CVE-2022-42082
+       RESERVED
+CVE-2022-42081
+       RESERVED
+CVE-2022-42080
+       RESERVED
+CVE-2022-42079
+       RESERVED
+CVE-2022-42078
+       RESERVED
+CVE-2022-42077
+       RESERVED
+CVE-2022-42076
+       RESERVED
+CVE-2022-42075
+       RESERVED
+CVE-2022-42074
+       RESERVED
+CVE-2022-42073
+       RESERVED
+CVE-2022-42072
+       RESERVED
+CVE-2022-42071
+       RESERVED
+CVE-2022-42070
+       RESERVED
+CVE-2022-42069
+       RESERVED
+CVE-2022-42068
+       RESERVED
+CVE-2022-42067
+       RESERVED
+CVE-2022-42066
+       RESERVED
+CVE-2022-42065
+       RESERVED
+CVE-2022-42064
+       RESERVED
+CVE-2022-42063
+       RESERVED
+CVE-2022-42062
+       RESERVED
+CVE-2022-42061
+       RESERVED
+CVE-2022-42060
+       RESERVED
+CVE-2022-42059
+       RESERVED
+CVE-2022-42058
+       RESERVED
+CVE-2022-42057
+       RESERVED
+CVE-2022-42056
+       RESERVED
+CVE-2022-42055
+       RESERVED
+CVE-2022-42054
+       RESERVED
+CVE-2022-42053
+       RESERVED
+CVE-2022-42052
+       RESERVED
+CVE-2022-42051
+       RESERVED
+CVE-2022-42050
+       RESERVED
+CVE-2022-42049
+       RESERVED
+CVE-2022-42048
+       RESERVED
+CVE-2022-42047
+       RESERVED
+CVE-2022-42046
+       RESERVED
+CVE-2022-42045
+       RESERVED
+CVE-2022-42044
+       RESERVED
+CVE-2022-42043
+       RESERVED
+CVE-2022-42042
+       RESERVED
+CVE-2022-42041
+       RESERVED
+CVE-2022-42040
+       RESERVED
+CVE-2022-42039
+       RESERVED
+CVE-2022-42038
+       RESERVED
+CVE-2022-42037
+       RESERVED
+CVE-2022-42036
+       RESERVED
+CVE-2022-42035
+       RESERVED
+CVE-2022-42034
+       RESERVED
+CVE-2022-42033
+       RESERVED
+CVE-2022-42032
+       RESERVED
+CVE-2022-42031
+       RESERVED
+CVE-2022-42030
+       RESERVED
+CVE-2022-42029
+       RESERVED
+CVE-2022-42028
+       RESERVED
+CVE-2022-42027
+       RESERVED
+CVE-2022-42026
+       RESERVED
+CVE-2022-42025
+       RESERVED
+CVE-2022-42024
+       RESERVED
+CVE-2022-42023
+       RESERVED
+CVE-2022-42022
+       RESERVED
+CVE-2022-42021
+       RESERVED
+CVE-2022-42020
+       RESERVED
+CVE-2022-42019
+       RESERVED
+CVE-2022-42018
+       RESERVED
+CVE-2022-42017
+       RESERVED
+CVE-2022-42016
+       RESERVED
+CVE-2022-42015
+       RESERVED
+CVE-2022-42014
+       RESERVED
+CVE-2022-42013
+       RESERVED
+CVE-2022-42012
+       RESERVED
+CVE-2022-42011
+       RESERVED
+CVE-2022-42010
+       RESERVED
+CVE-2022-3390
+       RESERVED
 CVE-2022-42009
        RESERVED
 CVE-2022-3389
@@ -2297,8 +2783,8 @@ CVE-2022-41084
        RESERVED
 CVE-2022-41083
        RESERVED
-CVE-2022-41082
-       RESERVED
+CVE-2022-41082 (Microsoft Exchange Server Remote Code Execution Vulnerability. 
...)
+       TODO: check
 CVE-2022-41081
        RESERVED
 CVE-2022-41080
@@ -2381,8 +2867,8 @@ CVE-2022-41042
        RESERVED
 CVE-2022-41041
        RESERVED
-CVE-2022-41040
-       RESERVED
+CVE-2022-41040 (Microsoft Exchange Server Elevation of Privilege 
Vulnerability. ...)
+       TODO: check
 CVE-2022-41039
        RESERVED
 CVE-2022-41038
@@ -2728,8 +3214,8 @@ CVE-2022-40888
        RESERVED
 CVE-2022-40887 (SourceCodester Best Student Result Management System 1.0 is 
vulnerable ...)
        NOT-FOR-US: SourceCodester Best Student Result Management System
-CVE-2022-40886
-       RESERVED
+CVE-2022-40886 (DedeCMS 5.7.98 has a file upload vulnerability in the 
background. ...)
+       TODO: check
 CVE-2022-40885
        RESERVED
 CVE-2022-40884
@@ -7872,6 +8358,7 @@ CVE-2022-38752 (Using snakeYAML to parse untrusted YAML 
files may be vulnerable
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081 (not 
public)
        NOTE: Deemed a false positive by upstream, only added a test
 CVE-2022-38751 (Using snakeYAML to parse untrusted YAML files may be 
vulnerable to Den ...)
+       {DLA-3132-1}
        - snakeyaml 1.31-1
        [bullseye] - snakeyaml <no-dsa> (Minor issue)
        NOTE: 
https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039
@@ -7879,12 +8366,14 @@ CVE-2022-38751 (Using snakeYAML to parse untrusted YAML 
files may be vulnerable
        NOTE: Fixed by 
https://bitbucket.org/snakeyaml/snakeyaml/commits/f3ab4e0f54c37ddb10f00b71d04187bb0ef1799c
        NOTE: Fixed by 
https://bitbucket.org/snakeyaml/snakeyaml/commits/6aedd33a811f7347c5dae2940e75940966f59466
 CVE-2022-38750 (Using snakeYAML to parse untrusted YAML files may be 
vulnerable to Den ...)
+       {DLA-3132-1}
        - snakeyaml 1.31-1
        [bullseye] - snakeyaml <no-dsa> (Minor issue)
        NOTE: 
https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027
        NOTE: Test case: 
https://bitbucket.org/snakeyaml/snakeyaml/commits/a8a072311547574274036f4a1b91a751b397a055
 CVE-2022-38749 (Using snakeYAML to parse untrusted YAML files may be 
vulnerable to Den ...)
+       {DLA-3132-1}
        - snakeyaml 1.31-1
        [bullseye] - snakeyaml <no-dsa> (Minor issue)
        NOTE: 
https://bitbucket.org/snakeyaml/snakeyaml/issues/525/got-stackoverflowerror-for-many-open
@@ -10691,7 +11180,7 @@ CVE-2022-37799 (Tenda AC1206 V15.03.06.23 was 
discovered to contain a stack over
 CVE-2022-37798 (Tenda AC1206 V15.03.06.23 was discovered to contain a stack 
overflow v ...)
        NOT-FOR-US: Tenda
 CVE-2022-37797 (In lighttpd 1.4.65, mod_wstunnel does not initialize a handler 
functio ...)
-       {DSA-5243-1}
+       {DSA-5243-1 DLA-3133-1}
        - lighttpd 1.4.66-1
        [buster] - lighttpd 1.4.53-1+deb10u3
        NOTE: https://redmine.lighttpd.net/issues/3165
@@ -43851,6 +44340,7 @@ CVE-2022-25858 (The package terser before 4.8.1, from 
5.0.0 and before 5.14.2 ar
        NOTE: 
https://github.com/terser/terser/commit/a4da7349fdc92c05094f41d33d06d8cd4e90e76b
 (v5.14.2)
        NOTE: 
https://github.com/terser/terser/commit/d8cc5691be980d663c29cc4d5ce67e852d597012
 (v4.8.1)
 CVE-2022-25857 (The package org.yaml:snakeyaml from 0 and before 1.31 are 
vulnerable t ...)
+       {DLA-3132-1}
        - snakeyaml 1.31-1 (bug #1019218)
        [bullseye] - snakeyaml <no-dsa> (Minor issue)
        NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/525



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/563ac9f85ca83abca0d22b0c12bc610975c4ea78

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/563ac9f85ca83abca0d22b0c12bc610975c4ea78
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to