[Git][security-tracker-team/security-tracker][master] 3 commits: add eterm, mrxvt, rxvt, rxvt-unicode
Thorsten Alteholz (@alteholz)
alteholz at debian.org
Fri May 21 10:27:32 BST 2021
Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker
Commits:
aeccc126 by Thorsten Alteholz at 2021-05-21T11:17:44+02:00
add eterm, mrxvt, rxvt, rxvt-unicode
- - - - -
b0028ed4 by Thorsten Alteholz at 2021-05-21T11:19:28+02:00
mark CVE-2021-3561 as no-dsa for Stretch
- - - - -
20129e44 by Thorsten Alteholz at 2021-05-21T11:27:06+02:00
add thunderbird
- - - - -
2 changed files:
- data/CVE/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -12,6 +12,7 @@ CVE-2021-3561 [Global buffer overflow in fig2dev/read.c in function read_objects
RESERVED
- fig2dev 1:3.2.8-3
[buster] - fig2dev <no-dsa> (Minor issue)
+ [stretch] - fig2dev <no-dsa> (Minor issue)
- transfig <removed>
NOTE: https://sourceforge.net/p/mcj/tickets/116/
NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/6827c09d2d6491cb2ae3ac7196439ff3aa791fd9/
=====================================
data/dla-needed.txt
=====================================
@@ -39,6 +39,9 @@ condor
NOTE: 20200727: Waiting on maintainer feedback: https://lists.debian.org/debian-lts/2020/07/msg00108.html (roberto)
NOTE: 20210205: Some patches seems to be available but not clear if it solves the whole issue or not. (ola)
--
+eterm
+ NOTE: 20210521: src/term.c:process_escape_seq(), probably just disable vulnerable escape sequence
+--
golang-github-appc-cni (Thorsten Alteholz)
NOTE: 20210517: still WIP, trying to automize golang updates
--
@@ -59,6 +62,9 @@ linux (Ben Hutchings)
--
linux-4.19 (Ben Hutchings)
--
+mrxvt
+ NOTE: 20210521: src/command.c:rxvt_process_graphics(), probably just disable vulnerable escape sequence or introduce Opt_insecure
+--
nvidia-graphics-drivers
NOTE: package is in non-free but also in packages-to-support
NOTE: only CVE‑2021‑1076 seems to be fixed in the R390 branch used in Stretch, no fix available for CVE-2021-1077
@@ -75,6 +81,10 @@ prosody
ring (Thorsten Alteholz)
NOTE: 20210510: WIP (need to update other releases first)
--
+rxvt
+--
+rxvt-unicode
+--
ruby-actionpack-page-caching
NOTE: 20200819: Upstream's patch on does not apply due to subsequent
NOTE: 20200819: refactoring. However, a quick look at the private
@@ -129,6 +139,8 @@ spotweb
NOTE: 20210122: Upstream fix trivially bypassed, reported under CVE-2021-3286
NOTE: 20210127: Upstream says "we can fix this but it may take some time", revisit later (Beuc)
--
+thunderbird
+--
xmlbeans (Roberto C. Sánchez)
NOTE: 20210222: Affected code changed significantly from 2.6.0 to 3.0.0 (the
NOTE: 20210222: upstream release with the fix). Trying to determine how to
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ddc1f2e32f1ac3c16974b254c3c48b1ccc9d8c13...20129e443d93ace6147a2402b6cf2802462cdb6b
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ddc1f2e32f1ac3c16974b254c3c48b1ccc9d8c13...20129e443d93ace6147a2402b6cf2802462cdb6b
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210521/de2de719/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list