[Git][security-tracker-team/security-tracker][master] drop glibc annotations relevant to ELTS

Helmut Grohne (@helmutg) helmutg at debian.org
Mon Oct 17 11:24:40 BST 2022



Helmut Grohne pushed to branch master at Debian Security Tracker / security-tracker


Commits:
7e2cfc0f by Helmut Grohne at 2022-10-17T12:22:40+02:00
drop glibc annotations relevant to ELTS

I talked this through with Emilio: We cannot presently override these in
the ELTS tracker (due to failing uniqueness constraints). Changing them
here is not appropriate. Thus delete them here and add them in the ELTs
tracker.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -111867,7 +111867,6 @@ CVE-2021-27646 (Use After Free vulnerability in iscsi_snapshot_comm_core in Syno
 CVE-2021-27645 (The nameserver caching daemon (nscd) in the GNU C Library (aka glibc o ...)
 	- glibc 2.31-10 (bug #983479)
 	[buster] - glibc <no-dsa> (Minor issue)
-	[stretch] - glibc <no-dsa> (Minor issue)
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=27462
 	NOTE: Introduced by: https://sourceware.org/git/?p=glibc.git;a=commit;h=745664bd798ec8fd50438605948eea594179fba1 (glibc-2.29)
 	NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commit;h=dca565886b5e8bd7966e15f0ca42ee5cff686673
@@ -209832,8 +209831,6 @@ CVE-2020-1752 (A use-after-free vulnerability introduced in glibc upstream versi
 CVE-2020-1751 (An out-of-bounds write vulnerability was found in glibc before 2.31 wh ...)
 	- glibc 2.30-3
 	[buster] - glibc <ignored> (powerpc is not supported by LTS)
-	[stretch] - glibc <ignored> (powerpc is not supported by ELTS)
-	[jessie] - glibc <ignored> (powerpc is not supported by ELTS)
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=25423
 	NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d93769405996dfc11d216ddbe415946617b5a494
 CVE-2020-1750 (A flaw was found in the machine-config-operator that causes an OpenShi ...)
@@ -245219,8 +245216,6 @@ CVE-2009-5155 (In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_
 	[stretch] - gnulib <no-dsa> (Minor issue)
 	[jessie] - gnulib <no-dsa> (Minor issue)
 	- glibc 2.28-1
-	[stretch] - glibc <no-dsa> (Minor issue)
-	[jessie] - glibc <no-dsa> (Minor issue)
 	- eglibc <removed>
 	NOTE: http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
 	NOTE: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
@@ -292574,7 +292569,6 @@ CVE-2018-11238
 CVE-2018-11237 (An AVX-512-optimized implementation of the mempcpy function in the GNU ...)
 	- glibc 2.27-4 (low; bug #899070)
 	[stretch] - glibc 2.24-11+deb9u4
-	[jessie] - glibc <no-dsa> (Minor issue, can be fixed along in future DSA or point update)
 	- eglibc <removed>
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=23196
 CVE-2018-11236 (stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 a ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e2cfc0fdf68e106cc5750b597b6e935b1d726eb

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e2cfc0fdf68e106cc5750b597b6e935b1d726eb
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221017/cc85cce7/attachment.htm>


More information about the debian-security-tracker-commits mailing list