9VSA22-00623-01 CSIRT alerta de actualización de seguridad de Oracle para abril 2022

El CSIRT de Gobierno comparte información sobre actualizaciones de Oracle, conducentes a remediar cientos de vulnerabilidades y correspondientes a la actualización trimestral que efectúa la compañía.

9VSA22-00623-01.jpg

Resumen

El Equipo de Respuesta ante Incidentes de Seguridad Informática del Gobierno de Chile, CSIRT de Gobierno, comparte información sobre actualizaciones de Oracle, conducentes a remediar cientos de vulnerabilidades y correspondientes a la actualización trimestral que efectúa la compañía.

Este informe incluye las medidas de mitigación, consistentes en instalar la última actualización de los productos afectados.

Vulnerabilidades

CVE-2017-1000353

CVE-2018-11212

CVE-2018-1285

CVE-2019-0227

CVE-2019-10086

CVE-2019-12086

CVE-2019-12399

CVE-2019-13565

CVE-2019-14862

CVE-2019-16789

CVE-2019-17195

CVE-2019-18276

CVE-2019-3740

CVE-2019-3799

CVE-2020-10878

CVE-2020-11022

CVE-2020-11612

CVE-2020-11971

CVE-2020-11979

CVE-2020-13434

CVE-2020-13936

CVE-2020-13956

CVE-2020-14155

CVE-2020-14340

CVE-2020-14343

CVE-2020-15250

CVE-2020-16135

CVE-2020-17521

CVE-2020-17527

CVE-2020-17530

CVE-2020-1968

CVE-2020-1971

CVE-2020-24750

CVE-2020-24977

CVE-2020-25638

CVE-2020-25649

CVE-2020-27218

CVE-2020-28052

CVE-2020-28196

CVE-2020-29363

CVE-2020-29582

CVE-2020-35198

CVE-2020-36242

CVE-2020-36518

CVE-2020-5245

CVE-2020-5421

CVE-2020-6950

CVE-2020-7226

CVE-2020-7760

CVE-2020-8174

CVE-2020-8203

CVE-2020-8231

CVE-2020-8554

CVE-2020-8908

CVE-2020-9488

CVE-2021-20289

CVE-2021-21275

CVE-2021-21409

CVE-2021-22096

CVE-2021-22118

CVE-2021-22132

CVE-2021-22569

CVE-2021-22570

CVE-2021-22901

CVE-2021-22946

CVE-2021-23017

CVE-2021-23450

CVE-2021-2351

CVE-2021-2464

CVE-2021-2471

CVE-2021-26291

CVE-2021-28168

CVE-2021-28169

CVE-2021-28170

CVE-2021-28657

CVE-2021-29425

CVE-2021-29921

CVE-2021-30129

CVE-2021-30468

CVE-2021-3156

CVE-2021-31812

CVE-2021-3200

CVE-2021-32066

CVE-2021-32626

CVE-2021-33037

CVE-2021-33813

CVE-2021-33880

CVE-2021-34429

CVE-2021-3450

CVE-2021-35043

CVE-2021-3518

CVE-2021-3520

CVE-2021-3521

CVE-2021-35515

CVE-2021-35574

CVE-2021-3572

CVE-2021-36090

CVE-2021-36090,

CVE-2021-36374

CVE-2021-3690

CVE-2021-3711

CVE-2021-3712

CVE-2021-37137

CVE-2021-37714

CVE-2021-3807

CVE-2021-38153

CVE-2021-39139

CVE-2021-39140

CVE-2021-39153

CVE-2021-39275

CVE-2021-40438

CVE-2021-40690

CVE-2021-41165

CVE-2021-41184

CVE-2021-4160

CVE-2021-41973

CVE-2021-42013

CVE-2021-42340

CVE-2021-42392

CVE-2021-43527

CVE-2021-43797

CVE-2021-43859

CVE-2021-44224

CVE-2021-44533

CVE-2021-44790

CVE-2021-44832

CVE-2022-0778

CVE-2022-20612

CVE-2022-20613

CVE-2022-20615

CVE-2022-21404

CVE-2022-21405

CVE-2022-21409

CVE-2022-21410

CVE-2022-21411

CVE-2022-21412

CVE-2022-21413

CVE-2022-21414

CVE-2022-21415

CVE-2022-21416

CVE-2022-21417

CVE-2022-21418

CVE-2022-21419

CVE-2022-21420

CVE-2022-21421

CVE-2022-21422

CVE-2022-21423

CVE-2022-21424

CVE-2022-21425

CVE-2022-21426

CVE-2022-21427

CVE-2022-21430

CVE-2022-21431

CVE-2022-21434

CVE-2022-21435

CVE-2022-21436

CVE-2022-21437

CVE-2022-21438

CVE-2022-21440

CVE-2022-21441

CVE-2022-21442

CVE-2022-21443

CVE-2022-21444

CVE-2022-21445

CVE-2022-21446

CVE-2022-21447

CVE-2022-21448

CVE-2022-21449

CVE-2022-21450

CVE-2022-21451

CVE-2022-21452

CVE-2022-21453

CVE-2022-21454

CVE-2022-21457

CVE-2022-21458

CVE-2022-21459

CVE-2022-21460

CVE-2022-21461

CVE-2022-21462

CVE-2022-21463

CVE-2022-21464

CVE-2022-21465

CVE-2022-21466

CVE-2022-21467

CVE-2022-21468

CVE-2022-21469

CVE-2022-21470

CVE-2022-21471

CVE-2022-21472

CVE-2022-21473

CVE-2022-21474

CVE-2022-21475

CVE-2022-21476

CVE-2022-21477

CVE-2022-21478

CVE-2022-21479

CVE-2022-21480

CVE-2022-21481

CVE-2022-21482

CVE-2022-21483

CVE-2022-21484

CVE-2022-21485

CVE-2022-21486

CVE-2022-21487

CVE-2022-21488

CVE-2022-21489

CVE-2022-21490

CVE-2022-21491

CVE-2022-21492

CVE-2022-21493

CVE-2022-21494

CVE-2022-21496

CVE-2022-21497

CVE-2022-21498

CVE-2022-22947

CVE-2022-22965

CVE-2022-23181

CVE-2022-23221

CVE-2022-23305

CVE-2022-23437

CVE-2022-23990

CVE-2022-24329

Impacto

Son consideradas vulnerabilidades críticas:

CVE-2022-21410

CVE-2021-23017

CVE-2021-26291

CVE-2022-21431

CVE-2022-23305

CVE-2022-23990

CVE-2022-22947

CVE-2017-1000353

CVE-2022-22965

CVE-2021-29921

CVE-2021-43527

CVE-2022-23221

CVE-2022-22965

CVE-2020-14343

CVE-2021-42392

CVE-2021-35574

CVE-2021-3520

CVE-2020-17530

CVE-2021-44790

CVE-2021-23450

CVE-2018-1285

CVE-2020-36242

CVE-2021-40438

CVE-2022-21420

CVE-2021-39275

CVE-2022-21445

CVE-2021-3711

CVE-2021-42013

CVE-2019-17195

Productos afectados

Engineered Systems Utilities, versions 12.1.0.2, 19c, 21c

Enterprise Manager Base Platform, versions 13.4.0.0, 13.5.0.0

Enterprise Manager for Peoplesoft, versions 13.4.1.1, 13.5.1.1

Enterprise Manager for Storage Management, version 13.4.0.0

Enterprise Manager Ops Center, version 12.4.0.0

Helidon, versions 1.4.7, 1.4.10, 2.0.0-RC1

Instantis EnterpriseTrack, versions 17.1, 17.2, 17.3

JD Edwards EnterpriseOne Tools, versions prior to 9.2.6.3

JD Edwards World Security, version A9.4

Management Cloud Engine, versions 1.5.0 and prior

Middleware Common Libraries and Tools, versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0

MySQL Cluster, versions 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior, 8.0.28 and prior

MySQL Connectors, versions 8.0.28 and prior

MySQL Enterprise Monitor, versions 8.0.29 and prior

MySQL Server, versions 5.7.37 and prior, 8.0.28 and prior

MySQL Workbench, versions 8.0.28 and prior

Oracle Advanced Supply Chain Planning, versions 12.1, 12.2

Oracle Agile Engineering Data Management, version 6.2.1.0

Oracle Agile PLM, version 9.3.6

Oracle Agile PLM MCAD Connector, version 3.6

Oracle Application Express, versions prior to 22.1

Oracle Application Testing Suite, version 13.3.0.1

Oracle Autovue for Agile Product Lifecycle Management, version 21.0.2

Oracle Banking Deposits and Lines of Credit Servicing, version 2.12.0

Oracle Banking Enterprise Default Management, versions 2.7.1, 2.10.0, 2.12.0

Oracle Banking Loans Servicing, version 2.12.0

Oracle Banking Party Management, version 2.7.0

Oracle Banking Payments, version 14.5

Oracle Banking Platform, versions 2.6.2, 2.7.1, 2.12.0

Oracle Banking Trade Finance, version 14.5

Oracle Banking Treasury Management, version 14.5

Oracle Blockchain Platform, versions prior to 21.1.2

Oracle Business Intelligence Enterprise Edition, versions 5.5.0.0.0, 5.9.0.0.0, 12.2.1.3.0, 12.2.1.4.0

Oracle Business Process Management Suite, versions 12.2.1.3.0, 12.2.1.4.0

Oracle Coherence, versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0

Oracle Commerce Guided Search, version 11.3.2

Oracle Communications ASAP, version 7.3

Oracle Communications Billing and Revenue Management, versions 12.0.0.4, 12.0.0.5

Oracle Communications Cloud Native Core Automated Test Suite, versions 1.8.0, 1.9.0, 22.1.0

Oracle Communications Cloud Native Core Binding Support Function, version 1.11.0

Oracle Communications Cloud Native Core Console, versions 1.9.0, 22.1.0

Oracle Communications Cloud Native Core Network Exposure Function, version 22.1.0

Oracle Communications Cloud Native Core Network Function Cloud Native Environment, versions 1.10.0, 22.1.0

Oracle Communications Cloud Native Core Network Repository Function, versions 1.15.0, 1.15.1, 22.1.0

Oracle Communications Cloud Native Core Network Slice Selection Function, versions 1.8.0, 22.1.0

Oracle Communications Cloud Native Core Policy, versions 1.14.0, 1.15.0, 22.1.0

Oracle Communications Cloud Native Core Security Edge Protection Proxy, versions 1.7.0, 22.1.0

Oracle Communications Cloud Native Core Service Communication Proxy, version 1.15.0

Oracle Communications Cloud Native Core Unified Data Repository, versions 1.15.0, 22.1.0

Oracle Communications Contacts Server, version 8.0.0.6.0

Oracle Communications Convergence, versions 3.0.2.2, 3.0.3.0

Oracle Communications Convergent Charging Controller, versions 6.0.1.0.0, 12.0.1.0.0-12.0.4.0.0

Oracle Communications Design Studio, versions 7.3.5, 7.4.0-7.4.2

Oracle Communications Diameter Intelligence Hub, versions 8.0.0-8.2.3

Oracle Communications Diameter Signaling Router, version 8.4.0.0

Oracle Communications EAGLE Application Processor

Oracle Communications EAGLE Element Management System, version 46.6

Oracle Communications EAGLE FTP Table Base Retrieval, version 4.5

Oracle Communications EAGLE LNP Application Processor, versions 10.1, 10.2

Oracle Communications EAGLE Software, versions 46.7.0, 46.8.0-46.8.2, 46.9.1-46.9.3

Oracle Communications Element Manager, versions prior to 9.0

Oracle Communications Evolved Communications Application Server, version 7.1

Oracle Communications Instant Messaging Server, version 10.0.1.5.0

Oracle Communications Interactive Session Recorder, version 6.4

Oracle Communications IP Service Activator, version 7.4.0

Oracle Communications Messaging Server, version 8.1

Oracle Communications MetaSolv Solution, version 6.3.1

Oracle Communications Network Charging and Control, versions 6.0.1.0.0, 12.0.1.0.0-12.0.4.0.0

Oracle Communications Network Integrity, versions 7.3.2, 7.3.5, 7.3.6

Oracle Communications Operations Monitor, versions 4.3, 4.4, 5.0

Oracle Communications Order and Service Management, versions 7.3, 7.4

Oracle Communications Performance Intelligence Center (PIC) Software, versions 10.3.0.0.0-10.3.0.2.1, 10.4.0.1.0-10.4.0.3.1

Oracle Communications Policy Management, versions 12.5.0.0.0, 12.6.0.0.0

Oracle Communications Pricing Design Center, versions 12.0.0.4, 12.0.0.5

Oracle Communications Services Gatekeeper, version 7.0.0.0.0

Oracle Communications Session Border Controller, versions 8.4, 9.0

Oracle Communications Session Report Manager, versions prior to 9.0

Oracle Communications Session Route Manager, versions prior to 9.0

Oracle Communications Unified Inventory Management, versions 7.4.1, 7.4.2

Oracle Communications Unified Session Manager, versions 8.2.5, 8.4.5

Oracle Communications User Data Repository, version 12.4

Oracle Communications WebRTC Session Controller, version 7.2.1

Oracle Data Integrator, versions 12.2.1.3.0, 12.2.1.4.0

Oracle Database Server, versions 12.1.0.2, 19c, 21c

Oracle Documaker, versions 12.6.0, 12.6.2-12.6.4, 12.7.0

Oracle E-Business Suite, versions 12.2.4-12.2.11, [EBS Cloud Manager and Backup Module] prior to 22.1.1.1, [Enterprise Command Center] 7.0, [Enterprise Information Discovery] 7-9

Oracle Enterprise Communications Broker, versions 3.2, 3.3

Oracle Enterprise Session Border Controller, versions 8.4, 9.0

Oracle Ethernet Switch ES1-24, version 1.3.1

Oracle Ethernet Switch TOR-72, version 1.2.2

Oracle Financial Services Analytical Applications Infrastructure, versions 8.0.6.0-8.0.9.0, 8.1.0.0-8.1.2.0

Oracle Financial Services Behavior Detection Platform, versions 8.0.6.0-8.0.8.0, 8.1.1.0, 8.1.1.1, 8.1.2.0

Oracle Financial Services Enterprise Case Management, versions 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0, 8.1.1.1, 8.1.2.0

Oracle Financial Services Revenue Management and Billing, versions 2.7.0.0, 2.7.0.1, 2.8.0.0

Oracle FLEXCUBE Universal Banking, versions 11.83.3, 12.1-12.4, 14.0-14.3, 14.5

Oracle Global Lifecycle Management OPatch

Oracle GoldenGate, versions prior to 12.3.0.1.2, prior to 23.1

Oracle GoldenGate Application Adapters, versions prior to 23.1

Oracle GoldenGate Big Data and Application Adapters, versions prior to 23.1

Oracle GraalVM Enterprise Edition, versions 20.3.5, 21.3.1, 22.0.0.2

Oracle Health Sciences Empirica Signal, versions 9.1.0.6, 9.2.0.0

Oracle Health Sciences InForm, versions 6.2.1.1, 6.3.2.1, 7.0.0.0

Oracle Health Sciences InForm Publisher, versions 6.2.1.1, 6.3.1.1

Oracle Health Sciences Information Manager, versions 3.0.1-3.0.4

Oracle Healthcare Data Repository, versions 8.1.0, 8.1.1

Oracle Healthcare Foundation, versions 7.3.0.1-7.3.0.4

Oracle Healthcare Master Person Index, version 5.0.1

Oracle Healthcare Translational Research, versions 4.1.0, 4.1.1

Oracle Hospitality Suite8, versions 8.10.2, 8.11.0-8.14.0

Oracle Hospitality Token Proxy Service, version 19.2

Oracle HTTP Server, versions 12.2.1.3.0, 12.2.1.4.0

Oracle Hyperion BI+, versions prior to 11.2.8.0

Oracle Hyperion Calculation Manager, versions prior to 11.2.8.0

Oracle Hyperion Data Relationship Management, versions prior to 11.2.8.0, prior to 11.2.9.0

Oracle Hyperion Financial Management, versions prior to 11.2.8.0

Oracle Hyperion Infrastructure Technology, versions prior to 11.2.8.0

Oracle Hyperion Planning, versions prior to 11.2.8.0

Oracle Hyperion Profitability and Cost Management, versions prior to 11.2.8.0

Oracle Hyperion Tax Provision, versions prior to 11.2.8.0

Oracle Identity Management Suite, versions 12.2.1.3.0, 12.2.1.4.0

Oracle Identity Manager Connector, versions 9.1.0, 11.1.1.5.0

Oracle iLearning, versions 6.2, 6.3

Oracle Insurance Data Gateway, version 1.0.1

Oracle Insurance Insbridge Rating and Underwriting, versions 5.2.0, 5.4.0-5.6.0, 5.6.1

Oracle Insurance Policy Administration, versions 11.0.2, 11.1.0, 11.2.8, 11.3.0, 11.3.1

Oracle Insurance Rules Palette, versions 11.0.2, 11.1.0, 11.2.8, 11.3.0, 11.3.1

Oracle Internet Directory, versions 12.2.1.3.0, 12.2.1.4.0

Oracle Java SE, versions 7u331, 8u321, 11.0.14, 17.0.2, 18

Oracle JDeveloper, versions 12.2.1.3.0, 12.2.1.4.0

Oracle Managed File Transfer, versions 12.2.1.3.0, 12.2.1.4.0

Oracle Middleware Common Libraries and Tools, version 12.2.1.4.0

Oracle NoSQL Database

Oracle Outside In Technology, version 8.5.5

Oracle Payment Interface, versions 19.1, 20.3

Oracle Product Lifecycle Analytics, version 3.6.1.0

Oracle REST Data Services, versions prior to 21.2

Oracle Retail Bulk Data Integration, version 16.0.3

Oracle Retail Customer Insights, versions 15.0.2, 16.0.2

Oracle Retail Customer Management and Segmentation Foundation, versions 17.0-19.0

Oracle Retail Data Extractor for Merchandising, versions 15.0.2, 16.0.2

Oracle Retail EFTLink, versions 17.0.2, 18.0.1, 19.0.1, 20.0.1, 21.0.0

Oracle Retail Extract Transform and Load, version 13.2.8

Oracle Retail Financial Integration, versions 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1

Oracle Retail Integration Bus, versions 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1

Oracle Retail Invoice Matching, version 16.0.3

Oracle Retail Merchandising System, versions 16.0.3, 19.0.1

Oracle Retail Service Backbone, versions 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1

Oracle Retail Store Inventory Management, versions 14.0.4.13, 14.1.3.5, 14.1.3.14, 15.0.3.3, 15.0.3.8, 16.0.3.7

Oracle Retail Xstore Office Cloud Service, versions 16.0.6, 17.0.4, 18.0.3, 19.0.2, 20.0.1

Oracle Retail Xstore Point of Service, versions 16.0.6, 17.0.4, 18.0.3, 19.0.2, 20.0.1, 21.0.0

Oracle SD-WAN Edge, versions 9.0, 9.1

Oracle Secure Backup

Oracle Secure Global Desktop, version 5.6

Oracle Solaris, version 11

Oracle Solaris Cluster, version 4

Oracle SQL Developer, versions prior to 21.99

Oracle StorageTek ACSLS, version 8.5.1

Oracle StorageTek Tape Analytics (STA), version 2.4

Oracle Taleo Platform, versions prior to 22.1

Oracle Transportation Management, versions 6.4.3, 6.5.1

Oracle Tuxedo, version 12.2.2.0.0

Oracle Utilities Framework, versions 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0

Oracle VM VirtualBox, versions prior to 6.1.34

Oracle Web Services Manager, versions 12.2.1.3.0, 12.2.1.4.0

Oracle WebCenter Portal, versions 12.2.1.3.0, 12.2.1.4.0

Oracle WebCenter Sites, versions 12.2.1.3.0, 12.2.1.4.0

Oracle WebLogic Server, versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0

Oracle ZFS Storage Appliance Kit, version 8.8

OSS Support Tools, versions 2.12.42, 18.3

PeopleSoft Enterprise CS Academic Advisement, version 9.2

PeopleSoft Enterprise FIN Cash Management, version 9.2

PeopleSoft Enterprise PeopleTools, versions 8.58, 8.59

PeopleSoft Enterprise PRTL Interaction Hub, version 9.1

Primavera Unifier, versions 17.7-17.12, 18.8, 19.12, 20.12, 21.12

Mitigación

Instalar las respectivas actualizaciones entregadas por el proveedor.

Enlaces

https://www.oracle.com/security-alerts/cpuapr2022.html

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000353

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11212

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1285

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0227

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10086

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12399

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13565

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14862

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16789

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17195

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3740

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3799

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11612

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11971

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11979

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13936

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14340

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16135

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17521

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17530

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25638

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25649

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27218

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28052

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29363

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29582

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35198

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36242

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36518

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5245

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5421

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6950

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7226

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7760

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8174

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8203

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8554

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9488

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20289

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21275

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21409

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22096

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22118

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22132

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22569

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22570

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22901

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23450

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2351

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2464

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2471

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26291

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28168

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28169

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28170

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28657

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30129

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30468

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31812

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3200

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33037

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33813

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33880

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34429

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35043

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3521

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35515

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35574

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3572

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36090

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36090,

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36374

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3690

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37137

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37714

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38153

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39139

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39140

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40690

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41165

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41184

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41973

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42013

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42340

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42392

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43797

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43859

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20612

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20613

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20615

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21404

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21405

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21409

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21410

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21411

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21412

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21413

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21414

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21415

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21416

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21417

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21418

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21419

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21420

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21421

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21422

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21423

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21424

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21425

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21430

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21431

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21435

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21436

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21437

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21438

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21440

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21441

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21442

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21444

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21445

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21446

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21447

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21448

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21450

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21451

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21452

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21453

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21454

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21457

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21458

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21459

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21460

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21461

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21462

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21463

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21464

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21465

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21466

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21467

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21468

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21469

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21470

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21471

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21472

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21473

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21474

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21475

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21477

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21478

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21479

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21480

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21481

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21482

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21483

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21484

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21485

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21486

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21487

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21488

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21489

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21490

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21491

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21492

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21493

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21494

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21497

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21498

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22947

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22965

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23181

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23221

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23437

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24329

Informe

El informe oficial publicado por el CSIRT del Gobierno de Chile está disponible en el siguiente enlace: 9VSA22-00623-01.