Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1607e908 by security tracker role at 2023-01-12T08:10:14+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,237 @@
+CVE-2023-23455 (atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel 
through 6.1. ...)
+       TODO: check
+CVE-2023-23454 (cbq_classify in net/sched/sch_cbq.c in the Linux kernel 
through 6.1.4  ...)
+       TODO: check
+CVE-2023-23453
+       RESERVED
+CVE-2023-23452
+       RESERVED
+CVE-2023-23451
+       RESERVED
+CVE-2023-23450
+       RESERVED
+CVE-2023-23449
+       RESERVED
+CVE-2023-23448
+       RESERVED
+CVE-2023-23447
+       RESERVED
+CVE-2023-23446
+       RESERVED
+CVE-2023-23445
+       RESERVED
+CVE-2023-23444
+       RESERVED
+CVE-2023-23443
+       RESERVED
+CVE-2023-23442
+       RESERVED
+CVE-2023-23441
+       RESERVED
+CVE-2023-23440
+       RESERVED
+CVE-2023-23439
+       RESERVED
+CVE-2023-23438
+       RESERVED
+CVE-2023-23437
+       RESERVED
+CVE-2023-23436
+       RESERVED
+CVE-2023-23435
+       RESERVED
+CVE-2023-23434
+       RESERVED
+CVE-2023-23433
+       RESERVED
+CVE-2023-23432
+       RESERVED
+CVE-2023-23431
+       RESERVED
+CVE-2023-23430
+       RESERVED
+CVE-2023-23429
+       RESERVED
+CVE-2023-23428
+       RESERVED
+CVE-2023-23427
+       RESERVED
+CVE-2023-23426
+       RESERVED
+CVE-2023-23425
+       RESERVED
+CVE-2023-23424
+       RESERVED
+CVE-2023-23423
+       RESERVED
+CVE-2023-23422
+       RESERVED
+CVE-2023-23421
+       RESERVED
+CVE-2023-23420
+       RESERVED
+CVE-2023-23419
+       RESERVED
+CVE-2023-23418
+       RESERVED
+CVE-2023-23417
+       RESERVED
+CVE-2023-23416
+       RESERVED
+CVE-2023-23415
+       RESERVED
+CVE-2023-23414
+       RESERVED
+CVE-2023-23413
+       RESERVED
+CVE-2023-23412
+       RESERVED
+CVE-2023-23411
+       RESERVED
+CVE-2023-23410
+       RESERVED
+CVE-2023-23409
+       RESERVED
+CVE-2023-23408
+       RESERVED
+CVE-2023-23407
+       RESERVED
+CVE-2023-23406
+       RESERVED
+CVE-2023-23405
+       RESERVED
+CVE-2023-23404
+       RESERVED
+CVE-2023-23403
+       RESERVED
+CVE-2023-23402
+       RESERVED
+CVE-2023-23401
+       RESERVED
+CVE-2023-23400
+       RESERVED
+CVE-2023-23399
+       RESERVED
+CVE-2023-23398
+       RESERVED
+CVE-2023-23397
+       RESERVED
+CVE-2023-23396
+       RESERVED
+CVE-2023-23395
+       RESERVED
+CVE-2023-23394
+       RESERVED
+CVE-2023-23393
+       RESERVED
+CVE-2023-23392
+       RESERVED
+CVE-2023-23391
+       RESERVED
+CVE-2023-23390
+       RESERVED
+CVE-2023-23389
+       RESERVED
+CVE-2023-23388
+       RESERVED
+CVE-2023-23387
+       RESERVED
+CVE-2023-23386
+       RESERVED
+CVE-2023-23385
+       RESERVED
+CVE-2023-23384
+       RESERVED
+CVE-2023-23383
+       RESERVED
+CVE-2023-23382
+       RESERVED
+CVE-2023-23381
+       RESERVED
+CVE-2023-23380
+       RESERVED
+CVE-2023-23379
+       RESERVED
+CVE-2023-23378
+       RESERVED
+CVE-2023-23377
+       RESERVED
+CVE-2023-23376
+       RESERVED
+CVE-2023-23375
+       RESERVED
+CVE-2023-23374
+       RESERVED
+CVE-2023-23373
+       RESERVED
+CVE-2023-23372
+       RESERVED
+CVE-2023-23371
+       RESERVED
+CVE-2023-23370
+       RESERVED
+CVE-2023-23369
+       RESERVED
+CVE-2023-23368
+       RESERVED
+CVE-2023-23367
+       RESERVED
+CVE-2023-23366
+       RESERVED
+CVE-2023-23365
+       RESERVED
+CVE-2023-23364
+       RESERVED
+CVE-2023-23363
+       RESERVED
+CVE-2023-23362
+       RESERVED
+CVE-2023-23361
+       RESERVED
+CVE-2023-23360
+       RESERVED
+CVE-2023-23359
+       RESERVED
+CVE-2023-23358
+       RESERVED
+CVE-2023-23357
+       RESERVED
+CVE-2023-23356
+       RESERVED
+CVE-2023-23355
+       RESERVED
+CVE-2023-23354
+       RESERVED
+CVE-2023-23353
+       RESERVED
+CVE-2023-23352
+       RESERVED
+CVE-2023-23351
+       RESERVED
+CVE-2023-23350
+       RESERVED
+CVE-2023-23349
+       RESERVED
+CVE-2023-0229
+       RESERVED
+CVE-2023-0228
+       RESERVED
+CVE-2023-0227 (Insufficient Session Expiration in GitHub repository 
pyload/pyload pri ...)
+       TODO: check
+CVE-2023-0226
+       RESERVED
+CVE-2023-0225
+       RESERVED
+CVE-2023-0224
+       RESERVED
+CVE-2023-0223
+       RESERVED
+CVE-2022-4886
+       RESERVED
+CVE-2022-48255
+       RESERVED
+CVE-2022-48254
+       RESERVED
 CVE-2023-23348
        RESERVED
 CVE-2023-23347
@@ -2256,10 +2490,10 @@ CVE-2023-0045
 CVE-2023-0044
        RESERVED
        NOT-FOR-US: Quarkus
-CVE-2022-4874
-       RESERVED
-CVE-2022-4873
-       RESERVED
+CVE-2022-4874 (Authentication bypass in Netcomm router models NF20MESH, NF20, 
and NL1 ...)
+       TODO: check
+CVE-2022-4873 (On Netcomm router models NF20MESH, NF20, and NL1902 a stack 
based buff ...)
+       TODO: check
 CVE-2022-4872
        RESERVED
 CVE-2022-48217 (** DISPUTED ** The tf_remapper_node component 1.1.1 for Robot 
Operatin ...)
@@ -2310,8 +2544,8 @@ CVE-2023-22587
        RESERVED
 CVE-2023-0043
        RESERVED
-CVE-2023-0042
-       RESERVED
+CVE-2023-0042 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
+       TODO: check
 CVE-2023-0041
        RESERVED
 CVE-2023-22586
@@ -2718,8 +2952,8 @@ CVE-2023-22494
        RESERVED
 CVE-2023-22493
        RESERVED
-CVE-2023-22492
-       RESERVED
+CVE-2023-22492 (ZITADEL is a combination of Auth0 and Keycloak. RefreshTokens 
is an OA ...)
+       TODO: check
 CVE-2023-22491
        RESERVED
 CVE-2023-22490
@@ -2728,8 +2962,8 @@ CVE-2023-22489
        RESERVED
 CVE-2023-22488
        RESERVED
-CVE-2023-22487
-       RESERVED
+CVE-2023-22487 (Flarum is a forum software for building communities. Using the 
mention ...)
+       TODO: check
 CVE-2023-22486
        RESERVED
 CVE-2023-22485
@@ -3988,8 +4222,7 @@ CVE-2022-47929
        RESERVED
 CVE-2022-47928 (In MISP before 2.4.167, there is XSS in the template file 
uploads in a ...)
        NOT-FOR-US: MISP
-CVE-2022-47927
-       RESERVED
+CVE-2022-47927 (An issue was discovered in MediaWiki before 1.35.9, 1.36.x 
through 1.3 ...)
        - mediawiki 1:1.39.1-1
        [bullseye] - mediawiki <postponed> (Minor issue, fix along in next 
security update)
        [buster] - mediawiki <postponed> (Minor issue, fix along in next 
security update)
@@ -6693,8 +6926,8 @@ CVE-2022-4500
        RESERVED
 CVE-2022-4499 (TP-Link routers, Archer C5 and WR710N-V1, using the latest 
software, t ...)
        TODO: check
-CVE-2022-4498
-       RESERVED
+CVE-2022-4498 (In TP-Link routers, Archer C5 and WR710N-V1, running the latest 
availa ...)
+       TODO: check
 CVE-2022-4497 (The Jetpack CRM WordPress plugin before 5.5 does not validate 
and esca ...)
        NOT-FOR-US: WordPress plugin
 CVE-2022-4496
@@ -8503,8 +8736,8 @@ CVE-2022-46793
        RESERVED
 CVE-2022-4366 (Exposure of Sensitive System Information to an Unauthorized 
Control Sp ...)
        NOT-FOR-US: daloRADIUS
-CVE-2022-4365
-       RESERVED
+CVE-2022-4365 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
+       TODO: check
 CVE-2022-4364 (A vulnerability classified as critical has been found in 
Teledyne FLIR ...)
        NOT-FOR-US: Teledyne
 CVE-2022-4363
@@ -8595,14 +8828,14 @@ CVE-2022-46769 (An improper neutralization of input 
during web page generation (
        NOT-FOR-US: Apache Sling
 CVE-2022-4346
        RESERVED
-CVE-2022-4345
-       RESERVED
-CVE-2022-4344
-       RESERVED
+CVE-2022-4345 (Infinite loops in the BPv6, OpenFlow, and Kafka protocol 
dissectors in ...)
+       TODO: check
+CVE-2022-4344 (Memory exhaustion in the Kafka protocol dissector in Wireshark 
4.0.0 t ...)
+       TODO: check
 CVE-2022-4343
        RESERVED
-CVE-2022-4342
-       RESERVED
+CVE-2022-4342 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
+       TODO: check
 CVE-2022-4341 (A vulnerability has been found in csliuwy coder-chain_gdut and 
classif ...)
        NOT-FOR-US: csliuwy coder-chain_gdut
 CVE-2022-46768 (Arbitrary file read vulnerability exists in Zabbix Web Service 
Report  ...)
@@ -10582,8 +10815,7 @@ CVE-2022-46178 (MeterSphere is a one-stop open source 
continuous testing platfor
        NOT-FOR-US: MeterSphere
 CVE-2022-46177 (Discourse is an option source discussion platform. Prior to 
version 2. ...)
        NOT-FOR-US: Discourse
-CVE-2022-46176
-       RESERVED
+CVE-2022-46176 (Cargo is a Rust package manager. The Rust Security Response WG 
was not ...)
        - cargo <unfixed>
        - rust-cargo <unfixed>
        NOTE: https://www.openwall.com/lists/oss-security/2023/01/10/3
@@ -10700,8 +10932,8 @@ CVE-2022-4169 (The Theme and plugin translation for 
Polylang is vulnerable to au
        NOT-FOR-US: Polylang
 CVE-2022-4168
        REJECTED
-CVE-2022-4167
-       RESERVED
+CVE-2022-4167 (Incorrect Authorization check affecting all versions of GitLab 
EE from ...)
+       TODO: check
 CVE-2022-4166 (The Contest Gallery WordPress plugin before 19.1.5.1, Contest 
Gallery  ...)
        NOT-FOR-US: WordPress plugin
 CVE-2022-4165 (The Contest Gallery WordPress plugin before 19.1.5.1, Contest 
Gallery  ...)
@@ -11497,8 +11729,8 @@ CVE-2022-45802
        RESERVED
 CVE-2022-45801
        RESERVED
-CVE-2022-4131
-       RESERVED
+CVE-2022-4131 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
+       TODO: check
 CVE-2022-4130 (A blind site-to-site request forgery vulnerability was found in 
Satell ...)
        NOT-FOR-US: Red Hat Satellite server
 CVE-2022-4129 (A flaw was found in the Linux kernel's Layer 2 Tunneling 
Protocol (L2T ...)
@@ -12423,8 +12655,8 @@ CVE-2022-4039
        RESERVED
 CVE-2022-4038
        RESERVED
-CVE-2022-4037
-       RESERVED
+CVE-2022-4037 (An issue has been discovered in GitLab CE/EE affecting all 
versions be ...)
+       TODO: check
 CVE-2022-45459
        RESERVED
 CVE-2022-45458
@@ -14545,8 +14777,8 @@ CVE-2022-41610
        RESERVED
 CVE-2022-3871
        RESERVED
-CVE-2022-3870
-       RESERVED
+CVE-2022-3870 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
+       TODO: check
 CVE-2022-44783
        RESERVED
 CVE-2022-44782
@@ -16415,7 +16647,7 @@ CVE-2022-3784 (A vulnerability classified as critical 
was found in Axiomatic Ben
        NOT-FOR-US: Bento4
 CVE-2022-3783 (A vulnerability, which was classified as problematic, has been 
found i ...)
        NOT-FOR-US: node-red-dashboard
-CVE-2022-3782 (keycloak: path traversal via double URL encoding ...)
+CVE-2022-3782 (keycloak: path traversal via double URL encoding. A flaw was 
found in  ...)
        NOT-FOR-US: Keycloak
 CVE-2022-3781 (Dashlane password and Keepass Server password in My Account 
Settings a ...)
        NOT-FOR-US: Devolutions Remote Desktop Manager
@@ -20873,8 +21105,8 @@ CVE-2022-3615
        RESERVED
 CVE-2022-3614 (In affected versions of Octopus Deploy users of certain 
browsers using ...)
        NOT-FOR-US: Octopus Deploy
-CVE-2022-3613
-       RESERVED
+CVE-2022-3613 (An issue has been discovered in GitLab CE/EE affecting all 
versions be ...)
+       TODO: check
 CVE-2022-3612
        RESERVED
 CVE-2022-3611
@@ -21114,8 +21346,8 @@ CVE-2022-3575 (Frauscher Sensortechnik GmbH FDS102 for 
FAdC R2 and FAdCi R2 v2.8
        NOT-FOR-US: Frauscher Sensortechnik
 CVE-2022-3574 (The WPForms Pro WordPress plugin before 1.7.7 does not validate 
its fo ...)
        NOT-FOR-US: WordPress plugin
-CVE-2022-3573
-       RESERVED
+CVE-2022-3573 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
+       TODO: check
 CVE-2022-3572
        RESERVED
        - gitlab <unfixed>
@@ -22335,8 +22567,8 @@ CVE-2022-3515
        NOTE: https://gnupg.org/blog/20221017-pepe-left-the-ksba.html
        NOTE: https://dev.gnupg.org/T6230
        NOTE: https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
-CVE-2022-3514
-       RESERVED
+CVE-2022-3514 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
+       TODO: check
 CVE-2022-3513
        RESERVED
 CVE-2022-3512 (Using warp-cli command "add-trusted-ssid", a user was able to 
disconne ...)
@@ -24923,6 +25155,7 @@ CVE-2022-41968 (Nextcloud Server is an open source 
personal cloud server. Prior
 CVE-2022-41967 (Dragonfly is a Java runtime dependency management library. 
Dragonfly v ...)
        NOT-FOR-US: Dragonfly
 CVE-2022-41966 (XStream serializes Java objects to XML and back again. 
Versions prior  ...)
+       {DSA-5315-1 DLA-3267-1}
        - libxstream-java 1.4.20-1 (bug #1027754)
        NOTE: 
https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv
        NOTE: https://x-stream.github.io/CVE-2022-41966.html
@@ -25039,6 +25272,7 @@ CVE-2022-41916 (Heimdal is an implementation of 
ASN.1/DER, PKIX, and Kerberos. V
        NOTE: 
https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx
        NOTE: 
https://github.com/heimdal/heimdal/commit/eb87af0c2d189c25294c7daf483a47b03af80c2c
 (heimdal-7.7.1)
 CVE-2022-41915 (Netty project is an event-driven asynchronous network 
application fram ...)
+       {DSA-5316-1 DLA-3268-1}
        - netty 1:4.1.48-6 (bug #1027180)
        NOTE: 
https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp
        NOTE: Fixed by 
https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4 
(netty-4.1.86.Final)
@@ -25117,6 +25351,7 @@ CVE-2022-41882 (The Nextcloud Desktop Client is a tool 
to synchronize files from
        NOTE: https://github.com/nextcloud/server/pull/34559
        TODO: check details, is owncloud-client similarly affected?
 CVE-2022-41881 (Netty project is an event-driven asynchronous network 
application fram ...)
+       {DSA-5316-1 DLA-3268-1}
        - netty 1:4.1.48-6 (bug #1027180)
        NOTE: 
https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985v
        NOTE: Fixed by 
https://github.com/netty/netty/commit/cd91cf3c99123bd1e53fd6a1de0e3d1922f05bb2 
(netty-4.1.86.Final)
@@ -25364,13 +25599,13 @@ CVE-2022-41848 (drivers/char/pcmcia/synclink_cs.c in 
the Linux kernel through 5.
        - linux <unfixed>
        NOTE: 
https://lore.kernel.org/lkml/20220919040251.GA302541@ubuntu/T/#rc85e751f467b3e6f9ccef92cfa7fb8a6cc50c270
 CVE-2022-41812
-       RESERVED
+       REJECTED
 CVE-2022-41811
-       RESERVED
+       REJECTED
 CVE-2022-41810
-       RESERVED
+       REJECTED
 CVE-2022-41809
-       RESERVED
+       REJECTED
 CVE-2022-41779 (Delta Electronics InfraSuite Device Master versions 00.00.01a 
and prio ...)
        NOT-FOR-US: Delta Electronics
 CVE-2022-41778
@@ -29609,8 +29844,7 @@ CVE-2022-3145
        RESERVED
 CVE-2022-3144 (The Wordfence Security &#8211; Firewall &amp; Malware Scan 
plugin for  ...)
        NOT-FOR-US: WordPress plugin
-CVE-2022-3143
-       RESERVED
+CVE-2022-3143 (wildfly-elytron: possible timing attacks via use of unsafe 
comparator. ...)
        NOT-FOR-US: WildFly Elytron
 CVE-2022-40137
        RESERVED
@@ -69696,8 +69930,8 @@ CVE-2022-25231 (The package node-opcua before 2.74.0 
are vulnerable to Denial of
        NOT-FOR-US: node-opcua/node-opcua
 CVE-2022-25171 (The package p4 before 0.0.7 are vulnerable to Command 
Injection via th ...)
        TODO: check
-CVE-2022-24913
-       RESERVED
+CVE-2022-24913 (Versions of the package com.fasterxml.util:java-merge-sort 
before 1.1. ...)
+       TODO: check
 CVE-2022-24912 (The package 
github.com/runatlantis/atlantis/server/controllers/events  ...)
        NOT-FOR-US: github.com/runatlantis/atlantis
 CVE-2022-24909
@@ -90448,6 +90682,7 @@ CVE-2021-43799 (Zulip is an open-source team 
collaboration tool. Zulip Server in
 CVE-2021-43798 (Grafana is an open-source platform for monitoring and 
observability. G ...)
        - grafana <removed>
 CVE-2021-43797 (Netty is an asynchronous event-driven network application 
framework fo ...)
+       {DSA-5316-1 DLA-3268-1}
        - netty 1:4.1.48-6 (bug #1001437)
        [stretch] - netty <no-dsa> (Minor issue)
        NOTE: 
https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq
@@ -110928,11 +111163,13 @@ CVE-2021-37139
 CVE-2021-37138
        RESERVED
 CVE-2021-37137 (The Snappy frame decoder function doesn't restrict the chunk 
length wh ...)
+       {DSA-5316-1 DLA-3268-1}
        - netty 1:4.1.48-6 (bug #1014769)
        [stretch] - netty <no-dsa> (Minor issue)
        NOTE: 
https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363
        NOTE: Fixed by: 
https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f 
(netty-4.1.68.Final)
 CVE-2021-37136 (The Bzip2 decompression decoder function doesn't allow setting 
size re ...)
+       {DSA-5316-1 DLA-3268-1}
        - netty 1:4.1.48-6 (bug #1014769)
        [stretch] - netty <no-dsa> (Minor issue)
        NOTE: 
https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv
@@ -350704,168 +350941,168 @@ CVE-2017-16338 (An attacker could send an 
authenticated HTTP request to trigger
        NOT-FOR-US: Insteon Hub
 CVE-2017-16337 (On Insteon Hub 2245-222 devices with firmware version 1012, 
specially  ...)
        NOT-FOR-US: Insteon Hub
-CVE-2017-16336
-       RESERVED
-CVE-2017-16335
-       RESERVED
-CVE-2017-16334
-       RESERVED
-CVE-2017-16333
-       RESERVED
-CVE-2017-16332
-       RESERVED
-CVE-2017-16331
-       RESERVED
-CVE-2017-16330
-       RESERVED
-CVE-2017-16329
-       RESERVED
-CVE-2017-16328
-       RESERVED
-CVE-2017-16327
-       RESERVED
-CVE-2017-16326
-       RESERVED
-CVE-2017-16325
-       RESERVED
-CVE-2017-16324
-       RESERVED
-CVE-2017-16323
-       RESERVED
-CVE-2017-16322
-       RESERVED
-CVE-2017-16321
-       RESERVED
-CVE-2017-16320
-       RESERVED
-CVE-2017-16319
-       RESERVED
-CVE-2017-16318
-       RESERVED
-CVE-2017-16317
-       RESERVED
-CVE-2017-16316
-       RESERVED
-CVE-2017-16315
-       RESERVED
-CVE-2017-16314
-       RESERVED
-CVE-2017-16313
-       RESERVED
-CVE-2017-16312
-       RESERVED
-CVE-2017-16311
-       RESERVED
-CVE-2017-16310
-       RESERVED
-CVE-2017-16309
-       RESERVED
-CVE-2017-16308
-       RESERVED
-CVE-2017-16307
-       RESERVED
-CVE-2017-16306
-       RESERVED
-CVE-2017-16305
-       RESERVED
-CVE-2017-16304
-       RESERVED
-CVE-2017-16303
-       RESERVED
-CVE-2017-16302
-       RESERVED
-CVE-2017-16301
-       RESERVED
-CVE-2017-16300
-       RESERVED
-CVE-2017-16299
-       RESERVED
-CVE-2017-16298
-       RESERVED
-CVE-2017-16297
-       RESERVED
-CVE-2017-16296
-       RESERVED
-CVE-2017-16295
-       RESERVED
-CVE-2017-16294
-       RESERVED
-CVE-2017-16293
-       RESERVED
-CVE-2017-16292
-       RESERVED
-CVE-2017-16291
-       RESERVED
-CVE-2017-16290
-       RESERVED
-CVE-2017-16289
-       RESERVED
-CVE-2017-16288
-       RESERVED
-CVE-2017-16287
-       RESERVED
-CVE-2017-16286
-       RESERVED
-CVE-2017-16285
-       RESERVED
-CVE-2017-16284
-       RESERVED
-CVE-2017-16283
-       RESERVED
-CVE-2017-16282
-       RESERVED
-CVE-2017-16281
-       RESERVED
-CVE-2017-16280
-       RESERVED
-CVE-2017-16279
-       RESERVED
-CVE-2017-16278
-       RESERVED
-CVE-2017-16277
-       RESERVED
-CVE-2017-16276
-       RESERVED
-CVE-2017-16275
-       RESERVED
-CVE-2017-16274
-       RESERVED
-CVE-2017-16273
-       RESERVED
-CVE-2017-16272
-       RESERVED
-CVE-2017-16271
-       RESERVED
-CVE-2017-16270
-       RESERVED
-CVE-2017-16269
-       RESERVED
-CVE-2017-16268
-       RESERVED
-CVE-2017-16267
-       RESERVED
-CVE-2017-16266
-       RESERVED
-CVE-2017-16265
-       RESERVED
-CVE-2017-16264
-       RESERVED
-CVE-2017-16263
-       RESERVED
-CVE-2017-16262
-       RESERVED
-CVE-2017-16261
-       RESERVED
-CVE-2017-16260
-       RESERVED
-CVE-2017-16259
-       RESERVED
-CVE-2017-16258
-       RESERVED
-CVE-2017-16257
-       RESERVED
-CVE-2017-16256
-       RESERVED
+CVE-2017-16336 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16335 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16334 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16333 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16332 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16331 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16330 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16329 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16328 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16327 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16326 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16325 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16324 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16323 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16322 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16321 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16320 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16319 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16318 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16317 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16316 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16315 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16314 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16313 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16312 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16311 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16310 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16309 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16308 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16307 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16306 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16305 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16304 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16303 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16302 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16301 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16300 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16299 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16298 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16297 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16296 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16295 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16294 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16293 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16292 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16291 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16290 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16289 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16288 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16287 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16286 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16285 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16284 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16283 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16282 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16281 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16280 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16279 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16278 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16277 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16276 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16275 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16274 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16273 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16272 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16271 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16270 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16269 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16268 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16267 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16266 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16265 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16264 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16263 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16262 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16261 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16260 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16259 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16258 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16257 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
+CVE-2017-16256 (Multiple exploitable buffer overflow vulnerabilities exist in 
the PubN ...)
+       TODO: check
 CVE-2017-16255 (An exploitable buffer overflow vulnerability exists in the 
PubNub mess ...)
        NOT-FOR-US: Insteon Hub
 CVE-2017-16254 (An exploitable buffer overflow vulnerability exists in the 
PubNub mess ...)
@@ -356555,8 +356792,8 @@ CVE-2017-14456
        REJECTED
 CVE-2017-14455 (On Insteon Hub 2245-222 devices with firmware version 1012, 
specially  ...)
        NOT-FOR-US: Insteon Hub
-CVE-2017-14454
-       RESERVED
+CVE-2017-14454 (Multiple exploitable buffer overflow vulnerabilities exists in 
the Pub ...)
+       TODO: check
 CVE-2017-14453 (On Insteon Hub 2245-222 devices with firmware version 1012, 
specially  ...)
        NOT-FOR-US: Insteon Hub
 CVE-2017-14452 (An exploitable buffer overflow vulnerability exists in the 
PubNub mess ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1607e908c3a75e4826deeba9309eed6019d4e6f5

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1607e908c3a75e4826deeba9309eed6019d4e6f5
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to