[Git][security-tracker-team/security-tracker][master] Process NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Oct 6 21:19:54 BST 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ca5e7053 by Salvatore Bonaccorso at 2021-10-06T22:19:24+02:00
Process NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -468,7 +468,7 @@ CVE-2021-41837
 CVE-2021-41833
 	RESERVED
 CVE-2021-3848 (An arbitrary file creation by privilege escalation vulnerability in Tr ...)
-	TODO: check
+	NOT-FOR-US: Trend Micro
 CVE-2021-3847
 	RESERVED
 CVE-2021-3846
@@ -7222,11 +7222,11 @@ CVE-2021-38927
 CVE-2021-38926
 	RESERVED
 CVE-2021-38925 (IBM Sterling B2B Integrator Standard Edition 5.2.0. 0 through 6.1.1.0  ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-38924
 	RESERVED
 CVE-2021-38923 (IBM PowerVM Hypervisor FW1010 could allow a privileged user to gain ac ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-38922
 	RESERVED
 CVE-2021-38921
@@ -29386,7 +29386,7 @@ CVE-2021-29910
 CVE-2021-29909
 	RESERVED
 CVE-2021-29908 (The IBM TS7700 Management Interface is vulnerable to unauthenticated a ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29907 (IBM OpenPages with Watson 8.1 and 8.2 could allow an authenticated use ...)
 	NOT-FOR-US: IBM
 CVE-2021-29906
@@ -29396,7 +29396,7 @@ CVE-2021-29905 (IBM Jazz for Service Management 1.1.3.10 and IBM Tivoli Netcool/
 CVE-2021-29904 (IBM Jazz for Service Management 1.1.3.10 and IBM Tivoli Netcool/OMNIbu ...)
 	NOT-FOR-US: IBM
 CVE-2021-29903 (IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 6.1.1.0 i ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29902
 	RESERVED
 CVE-2021-29901
@@ -29492,7 +29492,7 @@ CVE-2021-29857
 CVE-2021-29856 (IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 could allow an authenticated usre ...)
 	NOT-FOR-US: IBM
 CVE-2021-29855 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 i ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29854
 	RESERVED
 CVE-2021-29853 (IBM Planning Analytics 2.0 could expose information that could be used ...)
@@ -29528,9 +29528,9 @@ CVE-2021-29839
 CVE-2021-29838
 	RESERVED
 CVE-2021-29837 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 i ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29836 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0. through 6.1.1.0  ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29835
 	RESERVED
 CVE-2021-29834 (IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0. ...)
@@ -29606,7 +29606,7 @@ CVE-2021-29800 (IBM Tivoli Netcool/OMNIbus_GUI and IBM Jazz for Service Manageme
 CVE-2021-29799
 	RESERVED
 CVE-2021-29798 (IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.1.0 i ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29797
 	RESERVED
 CVE-2021-29796
@@ -29674,19 +29674,19 @@ CVE-2021-29766 (IBM i2 Analyst's Notebook Premium (IBM i2 Analyze 4.3.0, 4.3.1,
 CVE-2021-29765 (IBM PowerVM Hypervisor FW940 and FW950 could allow an attacker to obta ...)
 	NOT-FOR-US: IBM
 CVE-2021-29764 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 i ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29763 (IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 ...)
 	NOT-FOR-US: IBM
 CVE-2021-29762
 	RESERVED
 CVE-2021-29761 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 c ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29760 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 c ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29759 (IBM App Connect Enterprise Certified Container 1.0, 1.1, 1.2, and 1.3  ...)
 	NOT-FOR-US: IBM
 CVE-2021-29758 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 c ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29757 (IBM QRadar User Behavior Analytics 4.1.1 is vulnerable to cross-site r ...)
 	NOT-FOR-US: IBM
 CVE-2021-29756



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ca5e7053665e873ea760337f026b0bde56da94e2

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ca5e7053665e873ea760337f026b0bde56da94e2
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211006/08170ce8/attachment.htm>


More information about the debian-security-tracker-commits mailing list