Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e2fa5346 by security tracker role at 2023-03-04T20:10:39+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,37 @@
+CVE-2023-27604
+       RESERVED
+CVE-2023-27603
+       RESERVED
+CVE-2023-27602
+       RESERVED
+CVE-2023-1177
+       RESERVED
+CVE-2023-1176
+       RESERVED
+CVE-2023-1175 (Incorrect Calculation of Buffer Size in GitHub repository 
vim/vim prio ...)
+       TODO: check
+CVE-2022-4930
+       RESERVED
+CVE-2017-20181
+       RESERVED
+CVE-2017-20180
+       RESERVED
+CVE-2015-10095
+       RESERVED
+CVE-2015-10094
+       RESERVED
+CVE-2015-10093
+       RESERVED
+CVE-2015-10092
+       RESERVED
+CVE-2015-10091
+       RESERVED
+CVE-2015-10090
+       RESERVED
+CVE-2014-125092
+       RESERVED
+CVE-2006-10001
+       RESERVED
 CVE-2023-27601
        RESERVED
 CVE-2023-27600
@@ -206,8 +240,8 @@ CVE-2021-4328 (A vulnerability has been found in 
狮子鱼CMS and
        TODO: check
 CVE-2020-36665
        RESERVED
-CVE-2020-36664
-       RESERVED
+CVE-2020-36664 (A vulnerability has been found in Artesãos SEOTools up to 
0.17.1  ...)
+       TODO: check
 CVE-2020-36663 (A vulnerability, which was classified as problematic, was 
found in Art ...)
        TODO: check
 CVE-2023-27539
@@ -6387,7 +6421,7 @@ CVE-2023-25223
 CVE-2023-25222 (A heap-based buffer overflow vulnerability exits in GNU 
LibreDWG v0.12 ...)
        - libredwg <itp> (bug #595191)
 CVE-2023-25221 (Libde265 v1.0.10 was discovered to contain a 
heap-buffer-overflow vuln ...)
-       {DSA-5346-1}
+       {DSA-5346-1 DLA-3352-1}
        - libde265 1.0.11-1
        NOTE: https://github.com/strukturag/libde265/issues/388
        NOTE: 
https://github.com/strukturag/libde265/commit/857290982330e82d9e25d9d39527c6737021aa7d
 (v1.0.11)
@@ -7671,39 +7705,39 @@ CVE-2023-24760
 CVE-2023-24759
        RESERVED
 CVE-2023-24758 (libde265 v1.0.10 was discovered to contain a NULL pointer 
dereference  ...)
-       {DSA-5346-1}
+       {DSA-5346-1 DLA-3352-1}
        - libde265 1.0.11-1
        NOTE: https://github.com/strukturag/libde265/issues/383
        NOTE: 
https://github.com/strukturag/libde265/commit/bfb6de155f9fb015d2904cb4ef07809f17995276
 (v1.0.11)
 CVE-2023-24757 (libde265 v1.0.10 was discovered to contain a NULL pointer 
dereference  ...)
-       {DSA-5346-1}
+       {DSA-5346-1 DLA-3352-1}
        - libde265 1.0.11-1
        NOTE: https://github.com/strukturag/libde265/issues/385
        NOTE: 
https://github.com/strukturag/libde265/commit/48eb7dafe204b825b4a62948ed171a0cd3f1bda2
 (v1.0.11)
 CVE-2023-24756 (libde265 v1.0.10 was discovered to contain a NULL pointer 
dereference  ...)
-       {DSA-5346-1}
+       {DSA-5346-1 DLA-3352-1}
        - libde265 1.0.11-1
        NOTE: https://github.com/strukturag/libde265/issues/380
        NOTE: 
https://github.com/strukturag/libde265/commit/48eb7dafe204b825b4a62948ed171a0cd3f1bda2
 (v1.0.11)
 CVE-2023-24755 (libde265 v1.0.10 was discovered to contain a NULL pointer 
dereference  ...)
-       {DSA-5346-1}
+       {DSA-5346-1 DLA-3352-1}
        - libde265 1.0.11-1
        NOTE: https://github.com/strukturag/libde265/issues/384
        NOTE: 
https://github.com/strukturag/libde265/commit/48eb7dafe204b825b4a62948ed171a0cd3f1bda2
 (v1.0.11)
 CVE-2023-24754 (libde265 v1.0.10 was discovered to contain a NULL pointer 
dereference  ...)
-       {DSA-5346-1}
+       {DSA-5346-1 DLA-3352-1}
        - libde265 1.0.11-1
        NOTE: https://github.com/strukturag/libde265/issues/382
        NOTE: 
https://github.com/strukturag/libde265/commit/bfb6de155f9fb015d2904cb4ef07809f17995276
 (v1.0.11)
 CVE-2023-24753
        RESERVED
 CVE-2023-24752 (libde265 v1.0.10 was discovered to contain a NULL pointer 
dereference  ...)
-       {DSA-5346-1}
+       {DSA-5346-1 DLA-3352-1}
        - libde265 1.0.11-1
        NOTE: https://github.com/strukturag/libde265/issues/378
        NOTE: 
https://github.com/strukturag/libde265/commit/052bacb2535cf0024042eefde58e48df2c778f7c
 (v1.0.11)
 CVE-2023-24751 (libde265 v1.0.10 was discovered to contain a NULL pointer 
dereference  ...)
-       {DSA-5346-1}
+       {DSA-5346-1 DLA-3352-1}
        - libde265 1.0.11-1
        NOTE: https://github.com/strukturag/libde265/issues/379
        NOTE: 
https://github.com/strukturag/libde265/commit/7ea8e3cbb010bc02fa38419e87ed2281d7933850
 (v1.0.11)
@@ -239207,7 +239241,7 @@ CVE-2019-19922 (kernel/sched/fair.c in the Linux 
kernel before 5.3.9, when cpu.c
        [buster] - linux 4.19.87-1
        [stretch] - linux <not-affected> (Vulnerability introduced later)
        NOTE: 
https://git.kernel.org/linus/de53fd7aedb100f03e5d2231cfce0e4993282425
-CVE-2023-27561
+CVE-2023-27561 (runc through 1.1.4 has Incorrect Access Control leading to 
Escalation  ...)
        - runc <unfixed>
        NOTE: https://github.com/opencontainers/runc/issues/3751
        NOTE: 
https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e2fa53469782442bec04ef213239d261adf958e0

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e2fa53469782442bec04ef213239d261adf958e0
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to