[Git][security-tracker-team/security-tracker][master] 2 commits: gnuchess commit reference
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Sat Oct 26 23:41:24 BST 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
7ef93bce by Moritz Muehlenhoff at 2024-10-27T00:41:10+02:00
gnuchess commit reference
- - - - -
9544b227 by Moritz Muehlenhoff at 2024-10-27T00:41:12+02:00
mark zziplib as ignored
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -28576,7 +28576,7 @@ CVE-2024-39209 (luci-app-sms-tool v1.9-6 was discovered to contain a command inj
NOT-FOR-US: luci-app-sms-tool
CVE-2024-39134 (A Stack Buffer Overflow vulnerability in zziplibv 0.13.77 allows attac ...)
- zziplib <unfixed> (bug #1074424)
- [bookworm] - zziplib <no-dsa> (Minor issue)
+ [bookworm] - zziplib <ignored> (Minor issue)
[bullseye] - zziplib <no-dsa> (Minor issue)
[buster] - zziplib <postponed> (Minor issue, revisi when fixed upstream)
NOTE: https://github.com/gdraheim/zziplib/issues/165
@@ -28742,7 +28742,7 @@ CVE-2024-39153 (idccms v1.35 was discovered to contain a Cross-Site Request Forg
NOT-FOR-US: idccms
CVE-2024-39133 (Heap Buffer Overflow vulnerability in zziplib v0.13.77 allows attacker ...)
- zziplib <unfixed> (bug #1074417)
- [bookworm] - zziplib <no-dsa> (Minor issue)
+ [bookworm] - zziplib <ignored> (Minor issue)
[bullseye] - zziplib <no-dsa> (Minor issue)
[buster] - zziplib <postponed> (Minor issue, revisi when fixed upstream)
NOTE: https://github.com/gdraheim/zziplib/issues/164
@@ -272170,6 +272170,7 @@ CVE-2021-30184 (GNU Chess 6.2.7 allows attackers to execute arbitrary code via c
[stretch] - gnuchess <postponed> (Minor issue in a game; can be fixed in next update)
NOTE: https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html
NOTE: https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html
+ NOTE: http://git.savannah.gnu.org/cgit/chess.git/commit/?id=f6a65783ebb41bb87811e57754e65933550a44c0
CVE-2021-30183 (Cleartext storage of sensitive information in multiple versions of Oct ...)
NOT-FOR-US: Octopus Server
CVE-2021-30182
@@ -330907,7 +330908,7 @@ CVE-2020-18771 (Exiv2 0.27.99.0 has a global buffer over-read in Exiv2::Internal
NOTE: https://github.com/Exiv2/exiv2/issues/756
CVE-2020-18770 (An issue was discovered in function zzip_disk_entry_to_file_header in ...)
- zziplib <unfixed> (bug #1054910)
- [bookworm] - zziplib <no-dsa> (Minor issue)
+ [bookworm] - zziplib <ignored> (Minor issue)
[bullseye] - zziplib <no-dsa> (Minor issue)
[buster] - zziplib <no-dsa> (Minor issue)
NOTE: https://github.com/gdraheim/zziplib/issues/69
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ab5c484a4f3dc3a704a11196d460e3a086951824...9544b227810b3f8322cf57f72a8cb8549f87de9d
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ab5c484a4f3dc3a704a11196d460e3a086951824...9544b227810b3f8322cf57f72a8cb8549f87de9d
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241026/311ec9f7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list