Thorsten Alteholz pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f1305d96 by Thorsten Alteholz at 2021-09-23T17:26:59+02:00
add fig2dev

- - - - -
e48462ca by Thorsten Alteholz at 2021-09-23T17:27:00+02:00
follow security team and mark CVEs of libsolv as no-dsa

- - - - -
30e5ff86 by Thorsten Alteholz at 2021-09-23T17:27:02+02:00
follow security team and mark CVEs of vim as no-dsa

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -1514,6 +1514,7 @@ CVE-2021-3796 (vim is vulnerable to Use After Free ...)
        - vim <unfixed> (bug #994497)
        [bullseye] - vim <no-dsa> (Minor issue)
        [buster] - vim <no-dsa> (Minor issue)
+       [stretch] - vim <no-dsa> (Minor issue)
        NOTE: https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d/
        NOTE: 
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 
(v8.2.3428)
 CVE-2021-3795 (semver-regex is vulnerable to Inefficient Regular Expression 
Complexit ...)
@@ -1957,6 +1958,7 @@ CVE-2021-3778 (vim is vulnerable to Heap-based Buffer 
Overflow ...)
        - vim <unfixed> (bug #994498)
        [bullseye] - vim <no-dsa> (Minor issue)
        [buster] - vim <no-dsa> (Minor issue)
+       [stretch] - vim <no-dsa> (Minor issue)
        NOTE: https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
        NOTE: 
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f 
(v8.2.3409)
 CVE-2021-3777 (nodejs-tmpl is vulnerable to Inefficient Regular Expression 
Complexity ...)
@@ -2347,6 +2349,7 @@ CVE-2021-3770 (vim is vulnerable to Heap-based Buffer 
Overflow ...)
        - vim <unfixed> (bug #994076)
        [bullseye] - vim <no-dsa> (Minor issue)
        [buster] - vim <no-dsa> (Minor issue)
+       [stretch] - vim <no-dsa> (Minor issue)
        NOTE: https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
        NOTE: Fixed by: 
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9 
(v8.2.3402)
        NOTE: Followup fix for introduced memory leak: 
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e 
(v8.2.3403)
@@ -17534,6 +17537,7 @@ CVE-2021-33939
 CVE-2021-33938 (Buffer overflow vulnerability in function prune_to_recommended 
in src/ ...)
        - libsolv 0.7.17-1
        [buster] - libsolv <no-dsa> (Minor issue)
+       [stretch] - libsolv <no-dsa> (Minor issue)
        NOTE: https://github.com/openSUSE/libsolv/issues/420
        NOTE: 
https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec
 (0.7.17)
 CVE-2021-33937
@@ -17553,16 +17557,19 @@ CVE-2021-33931
 CVE-2021-33930 (Buffer overflow vulnerability in function 
pool_installable_whatprovide ...)
        - libsolv 0.7.17-1
        [buster] - libsolv <no-dsa> (Minor issue)
+       [stretch] - libsolv <no-dsa> (Minor issue)
        NOTE: https://github.com/openSUSE/libsolv/issues/417
        NOTE: 
https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec
 (0.7.17)
 CVE-2021-33929 (Buffer overflow vulnerability in function 
pool_disabled_solvable in sr ...)
        - libsolv 0.7.17-1
        [buster] - libsolv <no-dsa> (Minor issue)
+       [stretch] - libsolv <no-dsa> (Minor issue)
        NOTE: https://github.com/openSUSE/libsolv/issues/417
        NOTE: 
https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec
 (0.7.17)
 CVE-2021-33928 (Buffer overflow vulnerability in function pool_installable in 
src/repo ...)
        - libsolv 0.7.17-1
        [buster] - libsolv <no-dsa> (Minor issue)
+       [stretch] - libsolv <no-dsa> (Minor issue)
        NOTE: https://github.com/openSUSE/libsolv/issues/417
        NOTE: 
https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec
 (0.7.17)
 CVE-2021-33927


=====================================
data/dla-needed.txt
=====================================
@@ -33,6 +33,8 @@ debian-archive-keyring (Utkarsh)
   NOTE: https://lists.debian.org/debian-lts/2021/08/msg00037.html
   NOTE: 20210920: Raphael answered. will backport today. (utkarsh)
 --
+fig2dev
+--
 firmware-nonfree
   NOTE: 20210731: WIP: 
https://salsa.debian.org/lts-team/packages/firmware-nonfree
   NOTE: 20210828: Most CVEs are difficult to backport. Contacted Ben regarding 
possible "ignore" tag



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ef0fe6e5ab9c57627cfbf720a19fa07b76401bff...30e5ff86074d0b1d1a9624c46f4336d6c2d2f43c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ef0fe6e5ab9c57627cfbf720a19fa07b76401bff...30e5ff86074d0b1d1a9624c46f4336d6c2d2f43c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to