Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker
Commits: f1305d96 by Thorsten Alteholz at 2021-09-23T17:26:59+02:00 add fig2dev - - - - - e48462ca by Thorsten Alteholz at 2021-09-23T17:27:00+02:00 follow security team and mark CVEs of libsolv as no-dsa - - - - - 30e5ff86 by Thorsten Alteholz at 2021-09-23T17:27:02+02:00 follow security team and mark CVEs of vim as no-dsa - - - - - 2 changed files: - data/CVE/list - data/dla-needed.txt Changes: ===================================== data/CVE/list ===================================== @@ -1514,6 +1514,7 @@ CVE-2021-3796 (vim is vulnerable to Use After Free ...) - vim <unfixed> (bug #994497) [bullseye] - vim <no-dsa> (Minor issue) [buster] - vim <no-dsa> (Minor issue) + [stretch] - vim <no-dsa> (Minor issue) NOTE: https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d/ NOTE: https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 (v8.2.3428) CVE-2021-3795 (semver-regex is vulnerable to Inefficient Regular Expression Complexit ...) @@ -1957,6 +1958,7 @@ CVE-2021-3778 (vim is vulnerable to Heap-based Buffer Overflow ...) - vim <unfixed> (bug #994498) [bullseye] - vim <no-dsa> (Minor issue) [buster] - vim <no-dsa> (Minor issue) + [stretch] - vim <no-dsa> (Minor issue) NOTE: https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 NOTE: https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f (v8.2.3409) CVE-2021-3777 (nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity ...) @@ -2347,6 +2349,7 @@ CVE-2021-3770 (vim is vulnerable to Heap-based Buffer Overflow ...) - vim <unfixed> (bug #994076) [bullseye] - vim <no-dsa> (Minor issue) [buster] - vim <no-dsa> (Minor issue) + [stretch] - vim <no-dsa> (Minor issue) NOTE: https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/ NOTE: Fixed by: https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9 (v8.2.3402) NOTE: Followup fix for introduced memory leak: https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e (v8.2.3403) @@ -17534,6 +17537,7 @@ CVE-2021-33939 CVE-2021-33938 (Buffer overflow vulnerability in function prune_to_recommended in src/ ...) - libsolv 0.7.17-1 [buster] - libsolv <no-dsa> (Minor issue) + [stretch] - libsolv <no-dsa> (Minor issue) NOTE: https://github.com/openSUSE/libsolv/issues/420 NOTE: https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec (0.7.17) CVE-2021-33937 @@ -17553,16 +17557,19 @@ CVE-2021-33931 CVE-2021-33930 (Buffer overflow vulnerability in function pool_installable_whatprovide ...) - libsolv 0.7.17-1 [buster] - libsolv <no-dsa> (Minor issue) + [stretch] - libsolv <no-dsa> (Minor issue) NOTE: https://github.com/openSUSE/libsolv/issues/417 NOTE: https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec (0.7.17) CVE-2021-33929 (Buffer overflow vulnerability in function pool_disabled_solvable in sr ...) - libsolv 0.7.17-1 [buster] - libsolv <no-dsa> (Minor issue) + [stretch] - libsolv <no-dsa> (Minor issue) NOTE: https://github.com/openSUSE/libsolv/issues/417 NOTE: https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec (0.7.17) CVE-2021-33928 (Buffer overflow vulnerability in function pool_installable in src/repo ...) - libsolv 0.7.17-1 [buster] - libsolv <no-dsa> (Minor issue) + [stretch] - libsolv <no-dsa> (Minor issue) NOTE: https://github.com/openSUSE/libsolv/issues/417 NOTE: https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec (0.7.17) CVE-2021-33927 ===================================== data/dla-needed.txt ===================================== @@ -33,6 +33,8 @@ debian-archive-keyring (Utkarsh) NOTE: https://lists.debian.org/debian-lts/2021/08/msg00037.html NOTE: 20210920: Raphael answered. will backport today. (utkarsh) -- +fig2dev +-- firmware-nonfree NOTE: 20210731: WIP: https://salsa.debian.org/lts-team/packages/firmware-nonfree NOTE: 20210828: Most CVEs are difficult to backport. Contacted Ben regarding possible "ignore" tag View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ef0fe6e5ab9c57627cfbf720a19fa07b76401bff...30e5ff86074d0b1d1a9624c46f4336d6c2d2f43c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ef0fe6e5ab9c57627cfbf720a19fa07b76401bff...30e5ff86074d0b1d1a9624c46f4336d6c2d2f43c You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits