[Git][security-tracker-team/security-tracker][master] AST issues: Reference explicitly the advisory
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Jun 25 09:16:58 BST 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
52b8b2e3 by Salvatore Bonaccorso at 2021-06-25T10:16:27+02:00
AST issues: Reference explicitly the advisory
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -69,7 +69,7 @@ CVE-2021-3614
CVE-2021-35474 [Dynamic stack buffer overflow in cachekey plugin]
RESERVED
- trafficserver <unfixed> (bug #990303)
- NOTE: https://lists.apache.org/list.html?announce@trafficserver.apache.org
+ NOTE: https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cannounce.trafficserver.apache.org%3E
CVE-2021-35473
RESERVED
CVE-2021-35472
@@ -6590,15 +6590,15 @@ CVE-2021-32568
CVE-2021-32567 [Reading HTTP/2 frames too many times]
RESERVED
- trafficserver <unfixed> (bug #990303)
- NOTE: https://lists.apache.org/list.html?announce@trafficserver.apache.org
+ NOTE: https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cannounce.trafficserver.apache.org%3E
CVE-2021-32566 [Specific sequence of HTTP/2 frames can cause ATS to crash]
RESERVED
- trafficserver <unfixed> (bug #990303)
- NOTE: https://lists.apache.org/list.html?announce@trafficserver.apache.org
+ NOTE: https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cannounce.trafficserver.apache.org%3E
CVE-2021-32565 [HTTP Request Smuggling, content length with invalid charters]
RESERVED
- trafficserver <unfixed> (bug #990303)
- NOTE: https://lists.apache.org/list.html?announce@trafficserver.apache.org
+ NOTE: https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cannounce.trafficserver.apache.org%3E
CVE-2021-32564
RESERVED
CVE-2021-32562
@@ -18798,7 +18798,7 @@ CVE-2021-27578
CVE-2021-27577 [Incorrect handling of url fragment leads to cache poisoning]
RESERVED
- trafficserver <unfixed> (bug #990303)
- NOTE: https://lists.apache.org/list.html?announce@trafficserver.apache.org
+ NOTE: https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cannounce.trafficserver.apache.org%3E
CVE-2021-27576 (If was found that the NetTest web service can be used to overload the ...)
NOT-FOR-US: Apache OpenMeetings
CVE-2021-27575
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/52b8b2e39793286f05cac0cab5c7a360443839fc
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/52b8b2e39793286f05cac0cab5c7a360443839fc
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210625/1b06d59a/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list