Processed: tagging 990543, tagging 990542, found 990542 in 2.31-12 ..., tagging 990541 ..., tagging 990540 ...

2021-07-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 990543 + upstream
Bug #990543 [src:rpm] rpm: CVE-2021-35937 CVE-2021-35938 CVE-2021-35939
Added tag(s) upstream.
> tags 990542 + upstream
Bug #990542 [src:glibc] glibc: CVE-2021-35942
Added tag(s) upstream.
> found 990542 2.31-12
Bug #990542 [src:glibc] glibc: CVE-2021-35942
Marked as found in versions glibc/2.31-12.
> forwarded 990542 https://sourceware.org/bugzilla/show_bug.cgi?id=28011
Bug #990542 [src:glibc] glibc: CVE-2021-35942
Set Bug forwarded-to-address to 
'https://sourceware.org/bugzilla/show_bug.cgi?id=28011'.
> tags 990541 + upstream
Bug #990541 [src:unrar-nonfree] unrar-nonfree: CVE-2018-25018
Added tag(s) upstream.
> found 990541 1:6.0.3-1
Bug #990541 [src:unrar-nonfree] unrar-nonfree: CVE-2018-25018
Marked as found in versions unrar-nonfree/1:6.0.3-1.
> tags 990540 + upstream
Bug #990540 [src:mruby] mruby: CVE-2020-36401
Added tag(s) upstream.
> found 990540 2.1.2-2
Bug #990540 [src:mruby] mruby: CVE-2020-36401
Marked as found in versions mruby/2.1.2-2.
> found 990542 2.28-10
Bug #990542 [src:glibc] glibc: CVE-2021-35942
Marked as found in versions glibc/2.28-10.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
990540: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990540
990541: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990541
990542: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542
990543: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990543
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#990542: glibc: CVE-2021-35942

2021-07-01 Thread Moritz Mühlenhoff
Source: glibc
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for glibc.

CVE-2021-35942[0]:
Wild read in wordexp (parse_param)

https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942

Please adjust the affected versions in the BTS as needed.