[Git][security-tracker-team/security-tracker][master] drop glibc annotations relevant to ELTS
Helmut Grohne (@helmutg)
helmutg at debian.org
Mon Oct 17 11:24:40 BST 2022
Helmut Grohne pushed to branch master at Debian Security Tracker / security-tracker
Commits:
7e2cfc0f by Helmut Grohne at 2022-10-17T12:22:40+02:00
drop glibc annotations relevant to ELTS
I talked this through with Emilio: We cannot presently override these in
the ELTS tracker (due to failing uniqueness constraints). Changing them
here is not appropriate. Thus delete them here and add them in the ELTs
tracker.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -111867,7 +111867,6 @@ CVE-2021-27646 (Use After Free vulnerability in iscsi_snapshot_comm_core in Syno
CVE-2021-27645 (The nameserver caching daemon (nscd) in the GNU C Library (aka glibc o ...)
- glibc 2.31-10 (bug #983479)
[buster] - glibc <no-dsa> (Minor issue)
- [stretch] - glibc <no-dsa> (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=27462
NOTE: Introduced by: https://sourceware.org/git/?p=glibc.git;a=commit;h=745664bd798ec8fd50438605948eea594179fba1 (glibc-2.29)
NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commit;h=dca565886b5e8bd7966e15f0ca42ee5cff686673
@@ -209832,8 +209831,6 @@ CVE-2020-1752 (A use-after-free vulnerability introduced in glibc upstream versi
CVE-2020-1751 (An out-of-bounds write vulnerability was found in glibc before 2.31 wh ...)
- glibc 2.30-3
[buster] - glibc <ignored> (powerpc is not supported by LTS)
- [stretch] - glibc <ignored> (powerpc is not supported by ELTS)
- [jessie] - glibc <ignored> (powerpc is not supported by ELTS)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=25423
NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d93769405996dfc11d216ddbe415946617b5a494
CVE-2020-1750 (A flaw was found in the machine-config-operator that causes an OpenShi ...)
@@ -245219,8 +245216,6 @@ CVE-2009-5155 (In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_
[stretch] - gnulib <no-dsa> (Minor issue)
[jessie] - gnulib <no-dsa> (Minor issue)
- glibc 2.28-1
- [stretch] - glibc <no-dsa> (Minor issue)
- [jessie] - glibc <no-dsa> (Minor issue)
- eglibc <removed>
NOTE: http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
NOTE: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
@@ -292574,7 +292569,6 @@ CVE-2018-11238
CVE-2018-11237 (An AVX-512-optimized implementation of the mempcpy function in the GNU ...)
- glibc 2.27-4 (low; bug #899070)
[stretch] - glibc 2.24-11+deb9u4
- [jessie] - glibc <no-dsa> (Minor issue, can be fixed along in future DSA or point update)
- eglibc <removed>
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=23196
CVE-2018-11236 (stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 a ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e2cfc0fdf68e106cc5750b597b6e935b1d726eb
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e2cfc0fdf68e106cc5750b597b6e935b1d726eb
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221017/cc85cce7/attachment.htm>
More information about the debian-security-tracker-commits
mailing list