[Git][security-tracker-team/security-tracker][master] Add upstream tag information for commit for CVE-2021-30184

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Oct 27 06:06:54 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1f5c96ae by Salvatore Bonaccorso at 2024-10-27T07:06:21+01:00
Add upstream tag information for commit for CVE-2021-30184

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -272170,7 +272170,7 @@ CVE-2021-30184 (GNU Chess 6.2.7 allows attackers to execute arbitrary code via c
 	[stretch] - gnuchess <postponed> (Minor issue in a game; can be fixed in next update)
 	NOTE: https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html
 	NOTE: https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html
-	NOTE: http://git.savannah.gnu.org/cgit/chess.git/commit/?id=f6a65783ebb41bb87811e57754e65933550a44c0
+	NOTE: http://git.savannah.gnu.org/cgit/chess.git/commit/?id=f6a65783ebb41bb87811e57754e65933550a44c0 (v6.2.9-pre1)
 CVE-2021-30183 (Cleartext storage of sensitive information in multiple versions of Oct ...)
 	NOT-FOR-US: Octopus Server
 CVE-2021-30182



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1f5c96aeb45f33630462e040314ebf0dbdd82599

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1f5c96aeb45f33630462e040314ebf0dbdd82599
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241027/bc42ab8c/attachment.htm>


More information about the debian-security-tracker-commits mailing list