[Git][security-tracker-team/security-tracker][master] 2 commits: Remove no-dsa for buster for CVEs fixed in the DLA

Adrian Bunk (@bunk) bunk at debian.org
Tue Jan 31 18:44:18 GMT 2023



Adrian Bunk pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ab5e76a5 by Adrian Bunk at 2023-01-31T20:43:01+02:00
Remove no-dsa for buster for CVEs fixed in the DLA

- - - - -
5a1a9751 by Adrian Bunk at 2023-01-31T20:43:59+02:00
Reserve DLA-3304-1 for fig2dev

- - - - -


3 changed files:

- data/CVE/list
- data/DLA/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -127379,7 +127379,6 @@ CVE-2021-32281 (An issue was discovered in gravity through 0.8.1. A heap-buffer-
 CVE-2021-32280 (An issue was discovered in fig2dev before 3.2.8.. A NULL pointer deref ...)
 	{DLA-2778-1}
 	- fig2dev 1:3.2.7b-5 (bug #960736)
-	[buster] - fig2dev <no-dsa> (Minor issue)
 	- transfig <removed>
 	NOTE: https://sourceforge.net/p/mcj/tickets/107/
 	NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/f17a3b8a7d54c1bc56ab92512531772a0b3ec991/
@@ -185415,7 +185414,6 @@ CVE-2020-21677 (A heap-based buffer overflow in the sixel_encoder_output_without
 CVE-2020-21676 (A stack-based buffer overflow in the genpstrx_text() component in genp ...)
 	{DLA-2778-1}
 	- fig2dev 1:3.2.8-1
-	[buster] - fig2dev <no-dsa> (Minor issue)
 	[stretch] - fig2dev <not-affected> (Vulnerable code introduced later)
 	- transfig <removed>
 	NOTE: https://sourceforge.net/p/mcj/tickets/76/
@@ -185792,7 +185790,6 @@ CVE-2020-21533 (fig2dev 3.2.7b contains a stack buffer overflow in the read_text
 CVE-2020-21532 (fig2dev 3.2.7b contains a global buffer overflow in the setfigfont fun ...)
 	{DLA-2778-1}
 	- fig2dev 1:3.2.8-1
-	[buster] - fig2dev <no-dsa> (Minor issue)
 	- transfig <removed>
 	NOTE: https://sourceforge.net/p/mcj/tickets/64/
 	NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/421afa17d8cb8dafcaf3e6044a70790fa4fe307b/ (3.2.8)
@@ -185800,7 +185797,6 @@ CVE-2020-21532 (fig2dev 3.2.7b contains a global buffer overflow in the setfigfo
 CVE-2020-21531 (fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_i ...)
 	{DLA-2778-1}
 	- fig2dev 1:3.2.8-1
-	[buster] - fig2dev <no-dsa> (Minor issue)
 	- transfig <removed>
 	NOTE: https://sourceforge.net/p/mcj/tickets/63/
 	NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/2f8d1ae9763dcdc99b88a2b14849fe37174bcd69/ (3.2.8)
@@ -185814,7 +185810,6 @@ CVE-2020-21530 (fig2dev 3.2.7b contains a segmentation fault in the read_objects
 CVE-2020-21529 (fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline f ...)
 	{DLA-2778-1}
 	- fig2dev 1:3.2.8-1
-	[buster] - fig2dev <no-dsa> (Minor issue)
 	- transfig <removed>
 	NOTE: https://sourceforge.net/p/mcj/tickets/65/
 	NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/d70e4ba6308046f71cb51f67db8412155af52411/ (3.2.8)


=====================================
data/DLA/list
=====================================
@@ -1,3 +1,6 @@
+[31 Jan 2023] DLA-3304-1 fig2dev - security update
+	{CVE-2020-21529 CVE-2020-21531 CVE-2020-21532 CVE-2020-21676 CVE-2021-32280}
+	[buster] - fig2dev 1:3.2.7a-5+deb10u5
 [31 Jan 2023] DLA-3303-1 ruby-git - security update
 	{CVE-2022-25648 CVE-2022-46648 CVE-2022-47318}
 	[buster] - ruby-git 1.2.8-1+deb10u1


=====================================
data/dla-needed.txt
=====================================
@@ -45,10 +45,6 @@ erlang
   NOTE: 20230111: VCS: https://salsa.debian.org/erlang-team/packages/erlang
   NOTE: 20230111: Maintainer notes: Coordinate with maintainer, whether their VCS can be used.
 --
-fig2dev (Adrian Bunk)
-  NOTE: 20230105: Programming language: C.
-  NOTE: 20230105: Harmonize with bullseye 11.5 and stretch (Beuc/front-desk)
---
 firmware-nonfree
   NOTE: 20220906: Consider to check the severity of the issues again and judge whether a correction is worth it.
   NOTE: 20221204: Coming soon in the first week of December. (apo)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/d2c787fd954c29697bd0a24f1665de99ecccaa37...5a1a97514f876423316f62503edae8b9b263a0d1

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/d2c787fd954c29697bd0a24f1665de99ecccaa37...5a1a97514f876423316f62503edae8b9b263a0d1
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230131/6a235625/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list