[Git][security-tracker-team/security-tracker][master] Process NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Jul 13 09:18:31 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
62b57988 by Salvatore Bonaccorso at 2022-07-13T10:18:03+02:00
Process NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1184,15 +1184,15 @@ CVE-2022-35230 (An authenticated user can create a link with reflected Javascrip
 CVE-2022-35229 (An authenticated user can create a link with reflected Javascript code ...)
 	TODO: check
 CVE-2022-35228 (SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-35227 (A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50,  ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-35226
 	RESERVED
 CVE-2022-35225 (SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.3 ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-35224 (SAP Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7 ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-35223
 	RESERVED
 CVE-2022-35222
@@ -1337,15 +1337,15 @@ CVE-2022-35174
 CVE-2022-35173
 	RESERVED
 CVE-2022-35172 (SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.3 ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-35171 (When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files receive ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-35170 (SAP NetWeaver Enterprise Portal does - versions 7.10, 7.11, 7.20, 7.30 ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-35169 (SAP BusinessObjects Business Intelligence Platform (LCM) - versions 42 ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-35168 (Due to improper input sanitization of XML input in SAP Business One -  ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-35167
 	RESERVED
 CVE-2022-35166
@@ -8759,13 +8759,13 @@ CVE-2022-32250 (net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1
 	NOTE: https://git.kernel.org/linus/520778042ccca019f3ffa136dd0ca565c486cedd
 	NOTE: Was previously also tracked as CVE-2022-1966
 CVE-2022-32249 (Under special integration scenario of SAP Business one and SAP HANA -  ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-32248 (Due to missing input validation in the Manage Checkbooks component of  ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-32247 (SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.3 ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-32246 (SAP Busines Objects Business Intelligence Platform (Visual Difference  ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-32245
 	RESERVED
 CVE-2022-32244
@@ -10858,9 +10858,9 @@ CVE-2013-10003 (A vulnerability classified as critical has been found in Telecom
 CVE-2013-10002 (A vulnerability was found in Telecommunication Software SAMwin Contact ...)
 	NOT-FOR-US: Telecommunication Software SAMwin Contact Center Suite
 CVE-2022-31598 (Due to insufficient input validation, SAP Business Objects - version 4 ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-31597 (Within SAP S/4HANA - versions S4CORE 101, 102, 103, 104, 105, 106, SAP ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-31596
 	RESERVED
 CVE-2022-31595 (SAP Financial Consolidation - version 1010,�does not perform ne ...)
@@ -10868,11 +10868,11 @@ CVE-2022-31595 (SAP Financial Consolidation - version 1010,�does not perf
 CVE-2022-31594 (A highly privileged user can exploit SUID-root program to escalate his ...)
 	NOT-FOR-US: SAP
 CVE-2022-31593 (SAP Business One client - version 10.0 allows an attacker with low pri ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-31592 (The application SAP Enterprise Extension Defense Forces & Public S ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-31591 (SAP BusinessObjects BW Publisher Service - versions 420, 430, uses a s ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-31590 (SAP PowerDesigner Proxy - version 16.7, allows an attacker with low pr ...)
 	NOT-FOR-US: SAP
 CVE-2022-31589 (Due to improper authorization check, business users who are using Isra ...)
@@ -16493,7 +16493,7 @@ CVE-2022-29621
 CVE-2022-29620 (** DISPUTED ** FileZilla v3.59.0 allows attackers to obtain cleartext  ...)
 	NOT-FOR-US: Disputed Filezilla issue
 CVE-2022-29619 (Under certain conditions SAP BusinessObjects Business Intelligence Pla ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-29618 (Due to insufficient input validation, SAP NetWeaver Development Infras ...)
 	NOT-FOR-US: SAP
 CVE-2022-29617 (Due to improper error handling an authenticated user can crash CLA ass ...)
@@ -18901,7 +18901,7 @@ CVE-2022-28773 (Due to an uncontrolled recursion in SAP Web Dispatcher and SAP I
 CVE-2022-28772 (By overlong input values an attacker may force overwrite of the intern ...)
 	NOT-FOR-US: SAP
 CVE-2022-28771 (Due to missing authentication check, SAP Business one License service  ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2022-28770 (Due to insufficient input validation, SAPUI5 library(vbm) - versions 7 ...)
 	NOT-FOR-US: SAP
 CVE-2022-28769



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/62b579888a40fe120d79974509f5b29006069e66

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/62b579888a40fe120d79974509f5b29006069e66
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220713/069adb0d/attachment.htm>


More information about the debian-security-tracker-commits mailing list