[Git][security-tracker-team/security-tracker][master] Add upstream tag information for commit for CVE-2021-30184
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Oct 27 06:06:54 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
1f5c96ae by Salvatore Bonaccorso at 2024-10-27T07:06:21+01:00
Add upstream tag information for commit for CVE-2021-30184
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -272170,7 +272170,7 @@ CVE-2021-30184 (GNU Chess 6.2.7 allows attackers to execute arbitrary code via c
[stretch] - gnuchess <postponed> (Minor issue in a game; can be fixed in next update)
NOTE: https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html
NOTE: https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html
- NOTE: http://git.savannah.gnu.org/cgit/chess.git/commit/?id=f6a65783ebb41bb87811e57754e65933550a44c0
+ NOTE: http://git.savannah.gnu.org/cgit/chess.git/commit/?id=f6a65783ebb41bb87811e57754e65933550a44c0 (v6.2.9-pre1)
CVE-2021-30183 (Cleartext storage of sensitive information in multiple versions of Oct ...)
NOT-FOR-US: Octopus Server
CVE-2021-30182
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1f5c96aeb45f33630462e040314ebf0dbdd82599
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1f5c96aeb45f33630462e040314ebf0dbdd82599
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241027/bc42ab8c/attachment.htm>
More information about the debian-security-tracker-commits
mailing list