[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Sep 8 20:44:38 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
45be27c2 by Salvatore Bonaccorso at 2022-09-08T21:44:11+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -4029,7 +4029,7 @@ CVE-2022-38533 (In GNU Binutils before 2.40, there is a heap-buffer-overflow in
 CVE-2022-38532
 	RESERVED
 CVE-2022-38531 (FPT G-97RG6M R4.2.98.035 and G-97RG3 R4.2.43.078 are vulnerable to Rem ...)
-	TODO: check
+	NOT-FOR-US: FPT router
 CVE-2022-38530 (GPAC v2.1-DEV-rev232-gfcaa01ebb-master was discovered to contain a sta ...)
 	- gpac <unfixed>
 	[bullseye] - gpac <no-dsa> (Minor issue)
@@ -7819,11 +7819,11 @@ CVE-2022-37148
 CVE-2022-37147
 	RESERVED
 CVE-2022-37146 (The PlexTrac platform prior to version 1.28.0 allows for username enum ...)
-	TODO: check
+	NOT-FOR-US: PlexTrac
 CVE-2022-37145 (The PlexTrac platform prior to version 1.17.0 does not restrict excess ...)
-	TODO: check
+	NOT-FOR-US: PlexTrac
 CVE-2022-37144 (The PlexTrac platform prior to API version 1.17.0 does not restrict ex ...)
-	TODO: check
+	NOT-FOR-US: PlexTrac
 CVE-2022-37143
 	RESERVED
 CVE-2022-37142
@@ -10558,9 +10558,9 @@ CVE-2022-36091
 CVE-2022-36090
 	RESERVED
 CVE-2022-36089 (KubeVela is an application delivery platform Users using KubeVela's Ve ...)
-	TODO: check
+	NOT-FOR-US: KubeVela
 CVE-2022-36088 (GoCD is a continuous delivery server. Windows installations via either ...)
-	TODO: check
+	NOT-FOR-US: GoCD
 CVE-2022-36087
 	RESERVED
 CVE-2022-36086 (linked_list_allocator is an allocator usable for no_std systems. Prior ...)
@@ -10574,9 +10574,9 @@ CVE-2022-36083 (JOSE is "JSON Web Almost Everything" - JWA, JWS, JWE, JWT, JWK,
 CVE-2022-36082 (mangadex-downloader is a command-line tool to download manga from Mang ...)
 	TODO: check
 CVE-2022-36081 (Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, ...)
-	TODO: check
+	NOT-FOR-US: Wikmd
 CVE-2022-36080 (Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, ...)
-	TODO: check
+	NOT-FOR-US: Wikmd
 CVE-2022-36079 (Parse Server is an open source backend that can be deployed to any inf ...)
 	TODO: check
 CVE-2022-36078 (Binary provides encoding/decoding in Borsh and other formats. The vuln ...)
@@ -10602,7 +10602,7 @@ CVE-2022-36069 (Poetry is a dependency manager for Python. When handling depende
 CVE-2022-36068
 	RESERVED
 CVE-2022-36067 (vm2 is a sandbox that can run untrusted code with whitelisted Node's b ...)
-	TODO: check
+	NOT-FOR-US: Node vm2
 CVE-2022-36066
 	RESERVED
 CVE-2022-36065 (GrowthBook is an open-source platform for feature flagging and A/B tes ...)
@@ -10614,7 +10614,7 @@ CVE-2022-36063
 CVE-2022-36062
 	RESERVED
 CVE-2022-36061 (Elrond go is the go implementation for the Elrond Network protocol. In ...)
-	TODO: check
+	NOT-FOR-US: Elrond go
 CVE-2022-36060
 	RESERVED
 CVE-2022-36059
@@ -10629,7 +10629,7 @@ CVE-2022-36059
 	NOTE: https://matrix.org/blog/2022/08/31/security-releases-matrix-js-sdk-19-4-0-and-matrix-react-sdk-3-53-0
 	NOTE: https://github.com/matrix-org/matrix-js-sdk/commit/8716c1ab9ba93659173b806097c46a2be115199f (v19.4.0)
 CVE-2022-36058 (Elrond go is the go implementation for the Elrond Network protocol. In ...)
-	TODO: check
+	NOT-FOR-US: Elrond go
 CVE-2022-36057 (Discourse-Chat is an asynchronous messaging plugin for the Discourse o ...)
 	NOT-FOR-US: Discourse-Chat
 CVE-2022-36056
@@ -10647,7 +10647,7 @@ CVE-2022-36051 (ZITADEL combines the ease of Auth0 and the versatility of Keyclo
 CVE-2022-36050
 	RESERVED
 CVE-2022-36049 (Flux2 is a tool for keeping Kubernetes clusters in sync with sources o ...)
-	TODO: check
+	NOT-FOR-US: Flux project fluxcd
 CVE-2022-36048 (Zulip is an open-source team collaboration tool with topic-based threa ...)
 	NOT-FOR-US: Zulip
 CVE-2022-36047
@@ -11921,7 +11921,7 @@ CVE-2022-35515
 CVE-2022-35514
 	RESERVED
 CVE-2022-35513 (The Blink1Control2 application <= 2.2.7 uses weak password encrypti ...)
-	TODO: check
+	NOT-FOR-US: Blink1Control2 application
 CVE-2022-35512
 	RESERVED
 CVE-2022-35511
@@ -23054,7 +23054,7 @@ CVE-2022-31416
 CVE-2022-31415 (Online Fire Reporting System v1.0 was discovered to contain a SQL inje ...)
 	NOT-FOR-US: Online Fire Reporting System
 CVE-2022-31414 (D-Link DIR-1960 firmware DIR-1960_A1_1.11 was discovered to contain a  ...)
-	TODO: check
+	NOT-FOR-US: D-Link
 CVE-2022-31413
 	RESERVED
 CVE-2022-31412
@@ -23473,7 +23473,7 @@ CVE-2022-31248 (A Observable Response Discrepancy vulnerability in spacewalk-jav
 CVE-2022-31247 (An Improper Authorization vulnerability in SUSE Rancher, allows any us ...)
 	TODO: check
 CVE-2022-1807 (Multiple SQLi vulnerabilities in Webadmin allow for privilege escalati ...)
-	TODO: check
+	NOT-FOR-US: Sophos
 CVE-2022-1806 (Cross-site Scripting (XSS) - Reflected in GitHub repository rtxteam/rt ...)
 	NOT-FOR-US: RTX
 CVE-2022-31246 (paymentrequest.py in Electrum before 4.2.2 allows a file:// URL in the ...)
@@ -23679,9 +23679,9 @@ CVE-2022-31169 (Wasmtime is a standalone runtime for WebAssembly. There is a bug
 CVE-2022-31168 (Zulip is an open source team chat tool. Due to an incorrect authorizat ...)
 	NOT-FOR-US: Zulip
 CVE-2022-31167 (XWiki Platform Security Parent POM contains the security APIs for XWik ...)
-	TODO: check
+	NOT-FOR-US: XWiki
 CVE-2022-31166 (XWiki Platform Old Core is a core package for XWiki Platform, a generi ...)
-	TODO: check
+	NOT-FOR-US: XWiki
 CVE-2022-31165
 	RESERVED
 CVE-2022-31164 (Tovy is a a staff management system for Roblox groups. A vulnerability ...)
@@ -27006,7 +27006,7 @@ CVE-2022-30080
 CVE-2022-30079
 	RESERVED
 CVE-2022-30078 (NETGEAR R6200_V2 firmware versions through R6200v2-V1.0.3.12_10.1.11 a ...)
-	TODO: check
+	NOT-FOR-US: Netgear
 CVE-2022-30077
 	RESERVED
 CVE-2022-30076



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/45be27c28211b5a13d8fe7a5cc605a02ddab7e8c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/45be27c28211b5a13d8fe7a5cc605a02ddab7e8c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220908/ba310058/attachment.htm>


More information about the debian-security-tracker-commits mailing list