Neil Williams pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5bc81d9f by Neil Williams at 2022-05-09T10:22:17+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -49558,7 +49558,7 @@ CVE-2021-38489
 CVE-2021-38488 (Delta Electronics DIALink versions 1.2.4.0 and prior is 
vulnerable to  ...)
        NOT-FOR-US: Delta Electronics DIALink
 CVE-2021-38487 (RTI Connext DDS Professional, Connext DDS Secure versions 4.2x 
to 6.1. ...)
-       TODO: check
+       NOT-FOR-US: RTI Connext DDS
 CVE-2021-38486 (InHand Networks IR615 Router's Versions 2.3.0.r4724 and 
2.3.0.r4870 cl ...)
        NOT-FOR-US: InHand Networks IR615 Router
 CVE-2021-38485 (The affected product is vulnerable to improper input 
validation in the ...)
@@ -49638,11 +49638,11 @@ CVE-2021-38449 (Some API functions permit by-design 
writing or copying data into
 CVE-2021-38448 (The affected controllers do not properly sanitize the input 
containing ...)
        NOT-FOR-US: Trane
 CVE-2021-38447 (OCI OpenDDS versions prior to 3.18.1 are vulnerable when an 
attacker s ...)
-       TODO: check
+       NOT-FOR-US: OpenDDS
 CVE-2021-38446
        RESERVED
 CVE-2021-38445 (OCI OpenDDS versions prior to 3.18.1 do not handle a length 
parameter  ...)
-       TODO: check
+       NOT-FOR-US: OpenDDS
 CVE-2021-38444
        RESERVED
 CVE-2021-38443 (Eclipse CycloneDDS versions prior to 0.8.0 improperly handle 
invalid s ...)
@@ -49654,7 +49654,7 @@ CVE-2021-38441 (Eclipse CycloneDDS versions prior to 
0.8.0 are vulnerable to a w
 CVE-2021-38440 (FATEK Automation WinProladder versions 3.30 and prior is 
vulnerable to ...)
        NOT-FOR-US: FATEK Automation
 CVE-2021-38439 (All versions of GurumDDS are vulnerable to heap-based buffer 
overflow, ...)
-       TODO: check
+       NOT-FOR-US: GurumNetworks
 CVE-2021-38438 (A use after free vulnerability in FATEK Automation 
WinProladder versio ...)
        NOT-FOR-US: FATEK Automation
 CVE-2021-38437
@@ -49662,11 +49662,11 @@ CVE-2021-38437
 CVE-2021-38436 (FATEK Automation WinProladder versions 3.30 and prior lacks 
proper val ...)
        NOT-FOR-US: FATEK Automation
 CVE-2021-38435 (RTI Connext DDS Professional and Connext DDS Secure Versions 
4.2x to 6 ...)
-       TODO: check
+       NOT-FOR-US: RTI Connext DDS
 CVE-2021-38434 (FATEK Automation WinProladder versions 3.30 and prior lacks 
proper val ...)
        NOT-FOR-US: FATEK Automation
 CVE-2021-38433 (RTI Connext DDS Professional and Connext DDS Secure Versions 
4.2x to 6 ...)
-       TODO: check
+       NOT-FOR-US: RTI Connext DDS
 CVE-2021-38432 (FATEK Automation Communication Server Versions 1.13 and prior 
lacks pr ...)
        NOT-FOR-US: FATEK Automation Communication Server
 CVE-2021-38431 (An authenticated user using Advantech WebAccess SCADA in 
versions 9.0. ...)
@@ -49674,7 +49674,7 @@ CVE-2021-38431 (An authenticated user using Advantech 
WebAccess SCADA in version
 CVE-2021-38430 (FATEK Automation WinProladder versions 3.30 and prior proper 
validatio ...)
        NOT-FOR-US: FATEK Automation
 CVE-2021-38429 (OCI OpenDDS versions prior to 3.18.1 are vulnerable when an 
attacker s ...)
-       TODO: check
+       NOT-FOR-US: OpenDDS
 CVE-2021-38428 (Delta Electronics DIALink versions 1.2.4.0 and prior is 
vulnerable to  ...)
        NOT-FOR-US: Delta Electronics DIALink
 CVE-2021-38427 (RTI Connext DDS Professional and Connext DDS Secure Versions 
4.2.x to  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5bc81d9f8ce8fbcfa8ba0de16a02b8e57349e09f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5bc81d9f8ce8fbcfa8ba0de16a02b8e57349e09f
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to