[Git][security-tracker-team/security-tracker][master] 3 commits: add fig2dev
Thorsten Alteholz (@alteholz)
alteholz at debian.org
Thu Sep 23 16:27:20 BST 2021
Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f1305d96 by Thorsten Alteholz at 2021-09-23T17:26:59+02:00
add fig2dev
- - - - -
e48462ca by Thorsten Alteholz at 2021-09-23T17:27:00+02:00
follow security team and mark CVEs of libsolv as no-dsa
- - - - -
30e5ff86 by Thorsten Alteholz at 2021-09-23T17:27:02+02:00
follow security team and mark CVEs of vim as no-dsa
- - - - -
2 changed files:
- data/CVE/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -1514,6 +1514,7 @@ CVE-2021-3796 (vim is vulnerable to Use After Free ...)
- vim <unfixed> (bug #994497)
[bullseye] - vim <no-dsa> (Minor issue)
[buster] - vim <no-dsa> (Minor issue)
+ [stretch] - vim <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d/
NOTE: https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 (v8.2.3428)
CVE-2021-3795 (semver-regex is vulnerable to Inefficient Regular Expression Complexit ...)
@@ -1957,6 +1958,7 @@ CVE-2021-3778 (vim is vulnerable to Heap-based Buffer Overflow ...)
- vim <unfixed> (bug #994498)
[bullseye] - vim <no-dsa> (Minor issue)
[buster] - vim <no-dsa> (Minor issue)
+ [stretch] - vim <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
NOTE: https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f (v8.2.3409)
CVE-2021-3777 (nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity ...)
@@ -2347,6 +2349,7 @@ CVE-2021-3770 (vim is vulnerable to Heap-based Buffer Overflow ...)
- vim <unfixed> (bug #994076)
[bullseye] - vim <no-dsa> (Minor issue)
[buster] - vim <no-dsa> (Minor issue)
+ [stretch] - vim <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
NOTE: Fixed by: https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9 (v8.2.3402)
NOTE: Followup fix for introduced memory leak: https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e (v8.2.3403)
@@ -17534,6 +17537,7 @@ CVE-2021-33939
CVE-2021-33938 (Buffer overflow vulnerability in function prune_to_recommended in src/ ...)
- libsolv 0.7.17-1
[buster] - libsolv <no-dsa> (Minor issue)
+ [stretch] - libsolv <no-dsa> (Minor issue)
NOTE: https://github.com/openSUSE/libsolv/issues/420
NOTE: https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec (0.7.17)
CVE-2021-33937
@@ -17553,16 +17557,19 @@ CVE-2021-33931
CVE-2021-33930 (Buffer overflow vulnerability in function pool_installable_whatprovide ...)
- libsolv 0.7.17-1
[buster] - libsolv <no-dsa> (Minor issue)
+ [stretch] - libsolv <no-dsa> (Minor issue)
NOTE: https://github.com/openSUSE/libsolv/issues/417
NOTE: https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec (0.7.17)
CVE-2021-33929 (Buffer overflow vulnerability in function pool_disabled_solvable in sr ...)
- libsolv 0.7.17-1
[buster] - libsolv <no-dsa> (Minor issue)
+ [stretch] - libsolv <no-dsa> (Minor issue)
NOTE: https://github.com/openSUSE/libsolv/issues/417
NOTE: https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec (0.7.17)
CVE-2021-33928 (Buffer overflow vulnerability in function pool_installable in src/repo ...)
- libsolv 0.7.17-1
[buster] - libsolv <no-dsa> (Minor issue)
+ [stretch] - libsolv <no-dsa> (Minor issue)
NOTE: https://github.com/openSUSE/libsolv/issues/417
NOTE: https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec (0.7.17)
CVE-2021-33927
=====================================
data/dla-needed.txt
=====================================
@@ -33,6 +33,8 @@ debian-archive-keyring (Utkarsh)
NOTE: https://lists.debian.org/debian-lts/2021/08/msg00037.html
NOTE: 20210920: Raphael answered. will backport today. (utkarsh)
--
+fig2dev
+--
firmware-nonfree
NOTE: 20210731: WIP: https://salsa.debian.org/lts-team/packages/firmware-nonfree
NOTE: 20210828: Most CVEs are difficult to backport. Contacted Ben regarding possible "ignore" tag
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ef0fe6e5ab9c57627cfbf720a19fa07b76401bff...30e5ff86074d0b1d1a9624c46f4336d6c2d2f43c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ef0fe6e5ab9c57627cfbf720a19fa07b76401bff...30e5ff86074d0b1d1a9624c46f4336d6c2d2f43c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210923/1c0f34f1/attachment.htm>
More information about the debian-security-tracker-commits
mailing list