[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Nov 17 08:10:35 GMT 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0823f591 by security tracker role at 2021-11-17T08:10:26+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,579 @@
+CVE-2022-21741
+ RESERVED
+CVE-2022-21740
+ RESERVED
+CVE-2022-21739
+ RESERVED
+CVE-2022-21738
+ RESERVED
+CVE-2022-21737
+ RESERVED
+CVE-2022-21736
+ RESERVED
+CVE-2022-21735
+ RESERVED
+CVE-2022-21734
+ RESERVED
+CVE-2022-21733
+ RESERVED
+CVE-2022-21732
+ RESERVED
+CVE-2022-21731
+ RESERVED
+CVE-2022-21730
+ RESERVED
+CVE-2022-21729
+ RESERVED
+CVE-2022-21728
+ RESERVED
+CVE-2022-21727
+ RESERVED
+CVE-2022-21726
+ RESERVED
+CVE-2022-21725
+ RESERVED
+CVE-2022-21724
+ RESERVED
+CVE-2022-21723
+ RESERVED
+CVE-2022-21722
+ RESERVED
+CVE-2022-21721
+ RESERVED
+CVE-2022-21720
+ RESERVED
+CVE-2022-21719
+ RESERVED
+CVE-2022-21718
+ RESERVED
+CVE-2022-21717
+ RESERVED
+CVE-2022-21716
+ RESERVED
+CVE-2022-21715
+ RESERVED
+CVE-2022-21714
+ RESERVED
+CVE-2022-21713
+ RESERVED
+CVE-2022-21712
+ RESERVED
+CVE-2022-21711
+ RESERVED
+CVE-2022-21710
+ RESERVED
+CVE-2022-21709
+ RESERVED
+CVE-2022-21708
+ RESERVED
+CVE-2022-21707
+ RESERVED
+CVE-2022-21706
+ RESERVED
+CVE-2022-21705
+ RESERVED
+CVE-2022-21704
+ RESERVED
+CVE-2022-21703
+ RESERVED
+CVE-2022-21702
+ RESERVED
+CVE-2022-21701
+ RESERVED
+CVE-2022-21700
+ RESERVED
+CVE-2022-21699
+ RESERVED
+CVE-2022-21698
+ RESERVED
+CVE-2022-21697
+ RESERVED
+CVE-2022-21696
+ RESERVED
+CVE-2022-21695
+ RESERVED
+CVE-2022-21694
+ RESERVED
+CVE-2022-21693
+ RESERVED
+CVE-2022-21692
+ RESERVED
+CVE-2022-21691
+ RESERVED
+CVE-2022-21690
+ RESERVED
+CVE-2022-21689
+ RESERVED
+CVE-2022-21688
+ RESERVED
+CVE-2022-21687
+ RESERVED
+CVE-2022-21686
+ RESERVED
+CVE-2022-21685
+ RESERVED
+CVE-2022-21684
+ RESERVED
+CVE-2022-21683
+ RESERVED
+CVE-2022-21682
+ RESERVED
+CVE-2022-21681
+ RESERVED
+CVE-2022-21680
+ RESERVED
+CVE-2022-21679
+ RESERVED
+CVE-2022-21678
+ RESERVED
+CVE-2022-21677
+ RESERVED
+CVE-2022-21676
+ RESERVED
+CVE-2022-21675
+ RESERVED
+CVE-2022-21674
+ RESERVED
+CVE-2022-21673
+ RESERVED
+CVE-2022-21672
+ RESERVED
+CVE-2022-21671
+ RESERVED
+CVE-2022-21670
+ RESERVED
+CVE-2022-21669
+ RESERVED
+CVE-2022-21668
+ RESERVED
+CVE-2022-21667
+ RESERVED
+CVE-2022-21666
+ RESERVED
+CVE-2022-21665
+ RESERVED
+CVE-2022-21664
+ RESERVED
+CVE-2022-21663
+ RESERVED
+CVE-2022-21662
+ RESERVED
+CVE-2022-21661
+ RESERVED
+CVE-2022-21660
+ RESERVED
+CVE-2022-21659
+ RESERVED
+CVE-2022-21658
+ RESERVED
+CVE-2022-21657
+ RESERVED
+CVE-2022-21656
+ RESERVED
+CVE-2022-21655
+ RESERVED
+CVE-2022-21654
+ RESERVED
+CVE-2022-21653
+ RESERVED
+CVE-2022-21652
+ RESERVED
+CVE-2022-21651
+ RESERVED
+CVE-2022-21650
+ RESERVED
+CVE-2022-21649
+ RESERVED
+CVE-2022-21648
+ RESERVED
+CVE-2022-21647
+ RESERVED
+CVE-2022-21646
+ RESERVED
+CVE-2022-21645
+ RESERVED
+CVE-2022-21644
+ RESERVED
+CVE-2022-21643
+ RESERVED
+CVE-2022-21642
+ RESERVED
+CVE-2021-43959
+ RESERVED
+CVE-2021-43958
+ RESERVED
+CVE-2021-43957
+ RESERVED
+CVE-2021-43956
+ RESERVED
+CVE-2021-43955
+ RESERVED
+CVE-2021-43954
+ RESERVED
+CVE-2021-43953
+ RESERVED
+CVE-2021-43952
+ RESERVED
+CVE-2021-43951
+ RESERVED
+CVE-2021-43950
+ RESERVED
+CVE-2021-43949
+ RESERVED
+CVE-2021-43948
+ RESERVED
+CVE-2021-43947
+ RESERVED
+CVE-2021-43946
+ RESERVED
+CVE-2021-43945
+ RESERVED
+CVE-2021-43944
+ RESERVED
+CVE-2021-43943
+ RESERVED
+CVE-2021-43942
+ RESERVED
+CVE-2021-43941
+ RESERVED
+CVE-2021-43940
+ RESERVED
+CVE-2021-43939
+ RESERVED
+CVE-2021-43938
+ RESERVED
+CVE-2021-43937
+ RESERVED
+CVE-2021-43936
+ RESERVED
+CVE-2021-43935
+ RESERVED
+CVE-2021-43934
+ RESERVED
+CVE-2021-43933
+ RESERVED
+CVE-2021-43932
+ RESERVED
+CVE-2021-43931
+ RESERVED
+CVE-2021-43930
+ RESERVED
+CVE-2021-43929
+ RESERVED
+CVE-2021-43928
+ RESERVED
+CVE-2021-43927
+ RESERVED
+CVE-2021-43926
+ RESERVED
+CVE-2021-43925
+ RESERVED
+CVE-2021-43924
+ RESERVED
+CVE-2021-43923
+ RESERVED
+CVE-2021-43922
+ RESERVED
+CVE-2021-43921
+ RESERVED
+CVE-2021-43920
+ RESERVED
+CVE-2021-43919
+ RESERVED
+CVE-2021-43918
+ RESERVED
+CVE-2021-43917
+ RESERVED
+CVE-2021-43916
+ RESERVED
+CVE-2021-43915
+ RESERVED
+CVE-2021-43914
+ RESERVED
+CVE-2021-43913
+ RESERVED
+CVE-2021-43912
+ RESERVED
+CVE-2021-43911
+ RESERVED
+CVE-2021-43910
+ RESERVED
+CVE-2021-43909
+ RESERVED
+CVE-2021-43908
+ RESERVED
+CVE-2021-43907
+ RESERVED
+CVE-2021-43906
+ RESERVED
+CVE-2021-43905
+ RESERVED
+CVE-2021-43904
+ RESERVED
+CVE-2021-43903
+ RESERVED
+CVE-2021-43902
+ RESERVED
+CVE-2021-43901
+ RESERVED
+CVE-2021-43900
+ RESERVED
+CVE-2021-43899
+ RESERVED
+CVE-2021-43898
+ RESERVED
+CVE-2021-43897
+ RESERVED
+CVE-2021-43896
+ RESERVED
+CVE-2021-43895
+ RESERVED
+CVE-2021-43894
+ RESERVED
+CVE-2021-43893
+ RESERVED
+CVE-2021-43892
+ RESERVED
+CVE-2021-43891
+ RESERVED
+CVE-2021-43890
+ RESERVED
+CVE-2021-43889
+ RESERVED
+CVE-2021-43888
+ RESERVED
+CVE-2021-43887
+ RESERVED
+CVE-2021-43886
+ RESERVED
+CVE-2021-43885
+ RESERVED
+CVE-2021-43884
+ RESERVED
+CVE-2021-43883
+ RESERVED
+CVE-2021-43882
+ RESERVED
+CVE-2021-43881
+ RESERVED
+CVE-2021-43880
+ RESERVED
+CVE-2021-43879
+ RESERVED
+CVE-2021-43878
+ RESERVED
+CVE-2021-43877
+ RESERVED
+CVE-2021-43876
+ RESERVED
+CVE-2021-43875
+ RESERVED
+CVE-2021-43874
+ RESERVED
+CVE-2021-43873
+ RESERVED
+CVE-2021-43872
+ RESERVED
+CVE-2021-43871
+ RESERVED
+CVE-2021-43870
+ RESERVED
+CVE-2021-43869
+ RESERVED
+CVE-2021-43868
+ RESERVED
+CVE-2021-43867
+ RESERVED
+CVE-2021-43866
+ RESERVED
+CVE-2021-43865
+ RESERVED
+CVE-2021-43864
+ RESERVED
+CVE-2021-43863
+ RESERVED
+CVE-2021-43862
+ RESERVED
+CVE-2021-43861
+ RESERVED
+CVE-2021-43860
+ RESERVED
+CVE-2021-43859
+ RESERVED
+CVE-2021-43858
+ RESERVED
+CVE-2021-43857
+ RESERVED
+CVE-2021-43856
+ RESERVED
+CVE-2021-43855
+ RESERVED
+CVE-2021-43854
+ RESERVED
+CVE-2021-43853
+ RESERVED
+CVE-2021-43852
+ RESERVED
+CVE-2021-43851
+ RESERVED
+CVE-2021-43850
+ RESERVED
+CVE-2021-43849
+ RESERVED
+CVE-2021-43848
+ RESERVED
+CVE-2021-43847
+ RESERVED
+CVE-2021-43846
+ RESERVED
+CVE-2021-43845
+ RESERVED
+CVE-2021-43844
+ RESERVED
+CVE-2021-43843
+ RESERVED
+CVE-2021-43842
+ RESERVED
+CVE-2021-43841
+ RESERVED
+CVE-2021-43840
+ RESERVED
+CVE-2021-43839
+ RESERVED
+CVE-2021-43838
+ RESERVED
+CVE-2021-43837
+ RESERVED
+CVE-2021-43836
+ RESERVED
+CVE-2021-43835
+ RESERVED
+CVE-2021-43834
+ RESERVED
+CVE-2021-43833
+ RESERVED
+CVE-2021-43832
+ RESERVED
+CVE-2021-43831
+ RESERVED
+CVE-2021-43830
+ RESERVED
+CVE-2021-43829
+ RESERVED
+CVE-2021-43828
+ RESERVED
+CVE-2021-43827
+ RESERVED
+CVE-2021-43826
+ RESERVED
+CVE-2021-43825
+ RESERVED
+CVE-2021-43824
+ RESERVED
+CVE-2021-43823
+ RESERVED
+CVE-2021-43822
+ RESERVED
+CVE-2021-43821
+ RESERVED
+CVE-2021-43820
+ RESERVED
+CVE-2021-43819
+ RESERVED
+CVE-2021-43818
+ RESERVED
+CVE-2021-43817
+ RESERVED
+CVE-2021-43816
+ RESERVED
+CVE-2021-43815
+ RESERVED
+CVE-2021-43814
+ RESERVED
+CVE-2021-43813
+ RESERVED
+CVE-2021-43812
+ RESERVED
+CVE-2021-43811
+ RESERVED
+CVE-2021-43810
+ RESERVED
+CVE-2021-43809
+ RESERVED
+CVE-2021-43808
+ RESERVED
+CVE-2021-43807
+ RESERVED
+CVE-2021-43806
+ RESERVED
+CVE-2021-43805
+ RESERVED
+CVE-2021-43804
+ RESERVED
+CVE-2021-43803
+ RESERVED
+CVE-2021-43802
+ RESERVED
+CVE-2021-43801
+ RESERVED
+CVE-2021-43800
+ RESERVED
+CVE-2021-43799
+ RESERVED
+CVE-2021-43798
+ RESERVED
+CVE-2021-43797
+ RESERVED
+CVE-2021-43796
+ RESERVED
+CVE-2021-43795
+ RESERVED
+CVE-2021-43794
+ RESERVED
+CVE-2021-43793
+ RESERVED
+CVE-2021-43792
+ RESERVED
+CVE-2021-43791
+ RESERVED
+CVE-2021-43790
+ RESERVED
+CVE-2021-43789
+ RESERVED
+CVE-2021-43788
+ RESERVED
+CVE-2021-43787
+ RESERVED
+CVE-2021-43786
+ RESERVED
+CVE-2021-43785
+ RESERVED
+CVE-2021-43784
+ RESERVED
+CVE-2021-43783
+ RESERVED
+CVE-2021-43782
+ RESERVED
+CVE-2021-43781
+ RESERVED
+CVE-2021-43780
+ RESERVED
+CVE-2021-43779
+ RESERVED
+CVE-2021-43778
+ RESERVED
+CVE-2021-43777
+ RESERVED
+CVE-2021-43776
+ RESERVED
+CVE-2021-43775
+ RESERVED
+CVE-2021-3967
+ RESERVED
+CVE-2021-3966
+ RESERVED
+CVE-2021-3965
+ RESERVED
CVE-2021-43774
RESERVED
CVE-2021-43773
@@ -1444,8 +2020,8 @@ CVE-2021-43523 (In uClibc and uClibc-ng before 1.0.39, incorrect handling of spe
NOTE: https://github.com/wbx-github/uclibc-ng/commit/0f822af0445e5348ce7b7bd8ce1204244f31d174
CVE-2021-43522
RESERVED
-CVE-2021-3939
- RESERVED
+CVE-2021-3939 (Ubuntu-specific modifications to accountsservice (in patch file debian ...)
+ TODO: check
CVE-2021-3938 (snipe-it is vulnerable to Improper Neutralization of Input During Web ...)
NOT-FOR-US: snipe-it
CVE-2021-3937
@@ -1859,8 +2435,7 @@ CVE-2021-43339 (In Ericsson Network Location before 2021-07-31, it is possible f
NOT-FOR-US: Ericsson
CVE-2021-43338 (In Ericsson Network Location MPS GMPC21, it is possible to creates a n ...)
NOT-FOR-US: Ericsson
-CVE-2021-43337
- RESERVED
+CVE-2021-43337 (SchedMD Slurm 21.08.* before 21.08.4 has Incorrect Access Control. On ...)
- slurm-wlm <not-affected> (Affects only 21.08 series; vulnerable code introduced later)
NOTE: https://lists.schedmd.com/pipermail/slurm-announce/2021/000068.html
NOTE: https://www.schedmd.com/news.php?id=256
@@ -3651,12 +4226,12 @@ CVE-2021-43015
RESERVED
CVE-2021-43014
RESERVED
-CVE-2021-43013
- RESERVED
-CVE-2021-43012
- RESERVED
-CVE-2021-43011
- RESERVED
+CVE-2021-43013 (Adobe Media Encoder version 15.4.1 (and earlier) are affected by a mem ...)
+ TODO: check
+CVE-2021-43012 (Adobe Prelude version 10.1 (and earlier) are affected by a memory corr ...)
+ TODO: check
+CVE-2021-43011 (Adobe Prelude version 10.1 (and earlier) are affected by a memory corr ...)
+ TODO: check
CVE-2021-3905 [External triggered memory leak in Open vSwitch while processing fragmented packets]
RESERVED
- openvswitch <not-affected> (Vulnerable code introduced later)
@@ -4299,8 +4874,8 @@ CVE-2021-42733
RESERVED
CVE-2021-42732
RESERVED
-CVE-2021-42731
- RESERVED
+CVE-2021-42731 (Adobe InDesign versions 16.4 (and earlier) are affected by a Buffer Ov ...)
+ TODO: check
CVE-2021-42730
RESERVED
CVE-2021-42729
@@ -4309,18 +4884,18 @@ CVE-2021-42728
RESERVED
CVE-2021-42727
RESERVED
-CVE-2021-42726
- RESERVED
-CVE-2021-42725
- RESERVED
+CVE-2021-42726 (Adobe Media Encoder version 15.4 (and earlier) are affected by a memor ...)
+ TODO: check
+CVE-2021-42725 (Adobe Experience Manager version 6.5.9.0 (and earlier) are affected by ...)
+ TODO: check
CVE-2021-42724
RESERVED
-CVE-2021-42723
- RESERVED
+CVE-2021-42723 (Adobe Premiere Pro version 15.4 (and earlier) are affected by a memory ...)
+ TODO: check
CVE-2021-42722
RESERVED
-CVE-2021-42721
- RESERVED
+CVE-2021-42721 (Adobe Media Encoder version 15.4 (and earlier) are affected by a memor ...)
+ TODO: check
CVE-2021-42720
RESERVED
CVE-2021-42719
@@ -9859,6 +10434,7 @@ CVE-2021-40866 (Certain NETGEAR smart switches are affected by a remote admin pa
CVE-2021-3799 (grav-plugin-admin is vulnerable to Improper Restriction of Rendered UI ...)
NOT-FOR-US: Grav CMS
CVE-2021-41054 (tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buff ...)
+ {DLA-2820-1}
- atftp 0.7.git20210915-1 (bug #994895)
[bullseye] - atftp 0.7.git20120829-3.3+deb11u1
[buster] - atftp 0.7.git20120829-3.2~deb10u2
@@ -10223,11 +10799,11 @@ CVE-2021-40723
RESERVED
CVE-2021-40722
RESERVED
-CVE-2021-40721 (Adobe Connect version 11.2.2 (and earlier) is affected by a reflected ...)
+CVE-2021-40721 (Adobe Connect version 11.2.3 (and earlier) is affected by a reflected ...)
NOT-FOR-US: Adobe
CVE-2021-40720 (Ops CLI version 2.0.4 (and earlier) is affected by a Deserialization o ...)
NOT-FOR-US: Adobe
-CVE-2021-40719 (Adobe Connect version 11.2.2 (and earlier) is affected by a Deserializ ...)
+CVE-2021-40719 (Adobe Connect version 11.2.3 (and earlier) is affected by a Deserializ ...)
NOT-FOR-US: Adobe
CVE-2021-40718
RESERVED
@@ -13665,79 +14241,79 @@ CVE-2021-39265
CVE-2021-39264
RESERVED
CVE-2021-39263 (A crafted NTFS image can trigger a heap-based buffer overflow, caused ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39262 (A crafted NTFS image can cause an out-of-bounds access in ntfs_decompr ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39261 (A crafted NTFS image can cause a heap-based buffer overflow in ntfs_co ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39260 (A crafted NTFS image can cause an out-of-bounds access in ntfs_inode_s ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39259 (A crafted NTFS image can trigger an out-of-bounds access, caused by an ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39258 (A crafted NTFS image can cause out-of-bounds reads in ntfs_attr_find a ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39257 (A crafted NTFS image with an unallocated bitmap can lead to a endless ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39256 (A crafted NTFS image can cause a heap-based buffer overflow in ntfs_in ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39255 (A crafted NTFS image can trigger an out-of-bounds read, caused by an i ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39254 (A crafted NTFS image can cause an integer overflow in memmove, leading ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39253 (A crafted NTFS image can cause an out-of-bounds read in ntfs_runlists_ ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39252 (A crafted NTFS image can cause an out-of-bounds read in ntfs_ie_lookup ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-39251 (A crafted NTFS image can cause a NULL pointer dereference in ntfs_exte ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
@@ -23329,25 +23905,25 @@ CVE-2021-35271
CVE-2021-35270
RESERVED
CVE-2021-35269 (NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribu ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-35268 (In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS inod ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-35267 (NTFS-3G versions < 2021.8.22, a stack buffer overflow can occur whe ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-35266 (In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS inod ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
@@ -27960,7 +28536,7 @@ CVE-2021-33291
CVE-2021-33290
RESERVED
CVE-2021-33289 (In NTFS-3G versions < 2021.8.22, when a specially crafted MFT secti ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
@@ -27968,19 +28544,19 @@ CVE-2021-33289 (In NTFS-3G versions < 2021.8.22, when a specially crafted MFT
CVE-2021-33288
RESERVED
CVE-2021-33287 (In NTFS-3G versions < 2021.8.22, when specially crafted NTFS attrib ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-33286 (In NTFS-3G versions < 2021.8.22, when a specially crafted unicode s ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
CVE-2021-33285 (In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attr ...)
- {DSA-4971-1}
+ {DSA-4971-1 DLA-2819-1}
[experimental] - ntfs-3g 1:2021.8.22-1
- ntfs-3g 1:2021.8.22-2 (bug #988386)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/30/1
@@ -35999,7 +36575,8 @@ CVE-2021-30218 (samurai 1.2 has a NULL pointer dereference in writefile() in uti
NOT-FOR-US: samurai
CVE-2021-30217
RESERVED
-CVE-2021-30216 (Zoho Web mail version NA is affected by an incorrect access control vu ...)
+CVE-2021-30216
+ REJECTED
NOT-FOR-US: Zoho Web mail
CVE-2021-30215
RESERVED
@@ -127487,6 +128064,7 @@ CVE-2020-6098 (An exploitable denial of service vulnerability exists in the free
NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1030
NOTE: Possible fix: http://www.freediameter.net/trac/changeset/19ab8ac08a361642e7f9ec9f2657202c6f8ef9ee/freeDiameter?old=edfb2b662b91af94b2fccc48b11eec904ccab370
CVE-2020-6097 (An exploitable denial of service vulnerability exists in the atftpd da ...)
+ {DLA-2820-1}
- atftp 0.7.git20120829-3.2 (bug #970066)
[buster] - atftp 0.7.git20120829-3.2~deb10u1
NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0823f591eb5337b761db21dd2633ee84b5f83456
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0823f591eb5337b761db21dd2633ee84b5f83456
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211117/a9737104/attachment.htm>
More information about the debian-security-tracker-commits
mailing list