Processed: tagging 990543, tagging 990542, found 990542 in 2.31-12 ..., tagging 990541 ..., tagging 990540 ...
Processing commands for cont...@bugs.debian.org: > tags 990543 + upstream Bug #990543 [src:rpm] rpm: CVE-2021-35937 CVE-2021-35938 CVE-2021-35939 Added tag(s) upstream. > tags 990542 + upstream Bug #990542 [src:glibc] glibc: CVE-2021-35942 Added tag(s) upstream. > found 990542 2.31-12 Bug #990542 [src:glibc] glibc: CVE-2021-35942 Marked as found in versions glibc/2.31-12. > forwarded 990542 https://sourceware.org/bugzilla/show_bug.cgi?id=28011 Bug #990542 [src:glibc] glibc: CVE-2021-35942 Set Bug forwarded-to-address to 'https://sourceware.org/bugzilla/show_bug.cgi?id=28011'. > tags 990541 + upstream Bug #990541 [src:unrar-nonfree] unrar-nonfree: CVE-2018-25018 Added tag(s) upstream. > found 990541 1:6.0.3-1 Bug #990541 [src:unrar-nonfree] unrar-nonfree: CVE-2018-25018 Marked as found in versions unrar-nonfree/1:6.0.3-1. > tags 990540 + upstream Bug #990540 [src:mruby] mruby: CVE-2020-36401 Added tag(s) upstream. > found 990540 2.1.2-2 Bug #990540 [src:mruby] mruby: CVE-2020-36401 Marked as found in versions mruby/2.1.2-2. > found 990542 2.28-10 Bug #990542 [src:glibc] glibc: CVE-2021-35942 Marked as found in versions glibc/2.28-10. > thanks Stopping processing here. Please contact me if you need assistance. -- 990540: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990540 990541: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990541 990542: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542 990543: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990543 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#990542: glibc: CVE-2021-35942
Source: glibc X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for glibc. CVE-2021-35942[0]: Wild read in wordexp (parse_param) https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 Please adjust the affected versions in the BTS as needed.