[Git][security-tracker-team/security-tracker][master] 2 commits: Drop notes for a NFU

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Apr 20 15:25:33 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
a58d3402 by Salvatore Bonaccorso at 2022-04-20T16:17:17+02:00
Drop notes for a NFU

- - - - -
93436151 by Salvatore Bonaccorso at 2022-04-20T16:25:04+02:00
Pin point upstream tag information for some issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -33540,8 +33540,6 @@ CVE-2021-43155 (Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL i
 	NOT-FOR-US: ProjectWorlds Online Book Store PHP
 CVE-2021-43154 (Cross Site Scripting (XSS) vulnerability exists in CMS Made Simple 2.2 ...)
 	NOT-FOR-US: CMS Made Simple
-	NOTE: CVE ref is a 404
-	NOTE: https://vuldb.com/?id.197294
 CVE-2021-43153
 	RESERVED
 CVE-2021-43152
@@ -34428,32 +34426,32 @@ CVE-2021-42783 (Missing Authentication for Critical Function vulnerability in de
 CVE-2021-42782 (Stack buffer overflow issues were found in Opensc before version 0.22. ...)
 	- opensc 0.22.0-1
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016448
-	NOTE: https://github.com/OpenSC/OpenSC/commit/1252aca9 (0.22.0)
-	NOTE: https://github.com/OpenSC/OpenSC/commit/456ac566 (0.22.0)
-	NOTE: https://github.com/OpenSC/OpenSC/commit/7114fb71 (0.22.0)
-	NOTE: https://github.com/OpenSC/OpenSC/commit/78cdab94 (0.22.0)
-	NOTE: https://github.com/OpenSC/OpenSC/commit/ae1cf0be (0.22.0)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/1252aca9f10771ef5ba8405e73cf2da50827958f (0.22.0-rc1)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/456ac566938a1da774db06126a2fa6c0cba514b3 (0.22.0)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/7114fb71b54ddfe06ce5dfdab013f4c38f129d14 (0.22.0-rc1)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/78cdab949f098ad7e593d853229fccf57d749d0c (0.22.0-rc1)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/ae1cf0be90396fb6c0be95829bf0d3eecbd2fd1c (0.22.0-rc1)
 CVE-2021-42781 (Heap buffer overflow issues were found in Opensc before version 0.22.0 ...)
 	- opensc 0.22.0-1
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016439
-	NOTE: https://github.com/OpenSC/OpenSC/commit/05648b06 (0.22.0)
-	NOTE: https://github.com/OpenSC/OpenSC/commit/17d8980c (0.22.0)
-	NOTE: https://github.com/OpenSC/OpenSC/commit/40c50a3a (0.22.0)
-	NOTE: https://github.com/OpenSC/OpenSC/commit/5d4daf6c (0.22.0)
-	NOTE: https://github.com/OpenSC/OpenSC/commit/cae5c71f (0.22.0)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/05648b0604bf3e498e8d42dff3c6e7c56a5bf749 (0.22.0-rc1)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/17d8980cde7be597afc366b7e311d0d7cadcb1f4 (0.22.0-rc1)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/40c50a3a4219308aae90f6efd7b10213794a8d86 (0.22.0-rc1)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/5d4daf6c92e4668f5458f380f3cacea3e879d91a (0.22.0-rc1)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/cae5c71f90cc5b364efe14040923fd5aa3b5dd90 (0.22.0-rc1)
 CVE-2021-42780 (A use after return issue was found in Opensc before version 0.22.0 in  ...)
 	- opensc 0.22.0-1
-	NOTE: https://github.com/OpenSC/OpenSC/commit/5df913b7 (0.22.0)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/5df913b7f57ad89b9832555d24c08d23a534311e (0.22.0-rc1)
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016139
 CVE-2021-42779 (A heap use after free issue was found in Opensc before version 0.22.0  ...)
 	- opensc 0.22.0-1
-	NOTE: https://github.com/OpenSC/OpenSC/commit/1db88374 (0.22.0)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/1db88374bb7706a115d5c3617c6f16115c33bf27 (0.22.0-rc1)
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016086
 CVE-2021-42778 (A heap double free issue was found in Opensc before version 0.22.0 in  ...)
 	- opensc 0.22.0-1
-	NOTE: https://github.com/OpenSC/OpenSC/commit/f015746d (0.22.0)
+	NOTE: https://github.com/OpenSC/OpenSC/commit/f015746d22d249642c19674298a18ad824db0ed7 (0.22.0-rc1)
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28185
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016083
 CVE-2021-42777



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/661e5f141d15bc968e7daa17d75aa4c03f022fba...934361510dd7ddb2846f57226be9b21c43fd3ce6

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/661e5f141d15bc968e7daa17d75aa4c03f022fba...934361510dd7ddb2846f57226be9b21c43fd3ce6
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220420/b74204da/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list