Abhijith PA pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
38c02cf1 by Abhijith PA at 2021-03-06T14:13:22+05:30
Stretch triage

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -262,6 +262,7 @@ CVE-2021-27928
        RESERVED
 CVE-2021-27927 (In Zabbix before 4.0.28rc1, 5.x before 5.0.8rc1, 5.1.x and 
5.2.x befor ...)
        - zabbix 1:5.0.8+dfsg-1
+       [stretch] - zabbix <no-dsa> (minor issue)
        NOTE: https://support.zabbix.com/browse/ZBX-18942
 CVE-2021-27926
        RESERVED
@@ -287,6 +288,7 @@ CVE-2021-27918
 CVE-2021-3420 (A flaw was found in newlib in versions prior to 4.0.0. Improper 
overfl ...)
        - newlib <unfixed> (bug #984446)
        [buster] - newlib <no-dsa> (Minor issue)
+       [stretch] - newlib <no-dsa> (Minor issue)
        - picolibc 1.5-1
        - libnewlib-nano <unfixed> (bug #984424)
        [buster] - libnewlib-nano <no-dsa> (Minor issue)
@@ -19477,11 +19479,13 @@ CVE-2020-35525
 CVE-2020-35524 [Heap-based buffer overflow in TIFF2PDF tool]
        RESERVED
        - tiff 4.1.0+git201212-1
+       [stretch] - tiff <no-dsa> (can be fixed along in next DLA)
        NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22
        NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/159
 CVE-2020-35523 [Integer overflow in tif_getimage.c]
        RESERVED
        - tiff 4.1.0+git201212-1
+       [stretch] - tiff <no-dsa> (can be fixed along in next DLA)
        NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2
        NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/160
 CVE-2020-35522 [Memory allocation failure in tif_pixarlog.c]
@@ -26266,6 +26270,7 @@ CVE-2020-28497
        RESERVED
 CVE-2020-28496 (This affects the package three before 0.125.0. This can happen 
when ha ...)
        - three.js <unfixed>
+       [stretch] - three.js <no-dsa> (can be fixed along in next DLA)
        NOTE: 
https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e
        NOTE: https://github.com/mrdoob/three.js/issues/21132
 CVE-2020-28495 (This affects the package total.js before 3.4.7. The set 
function can b ...)
@@ -31175,6 +31180,7 @@ CVE-2020-27353
 CVE-2020-27352
        RESERVED
        - snapd 2.49-1
+       [stretch] - snapd <no-dsa> (Minor issue)
        NOTE: https://ubuntu.com/security/notices/USN-4728-1
        NOTE: 
https://github.com/docker-snap/docker-snap/security/advisories/GHSA-798c-v3jq-h646
        NOTE: https://bugs.launchpad.net/snapd/+bug/1910456


=====================================
data/dla-needed.txt
=====================================
@@ -67,6 +67,8 @@ libebml (Thorsten Alteholz)
 libupnp
   NOTE: 20210302: since utkarsh working wpa, might want to handle this as well 
? (abhijith)
 --
+libcaca (Abhijith PA)
+--
 linux (Ben Hutchings)
 --
 linux-4.19 (Ben Hutchings)
@@ -117,6 +119,8 @@ shiro
   NOTE: 20201004: Sent additional request to upstream dev list; stil no 
response. (roberto)
   NOTE: 20201220: Upstream has responded.  Working with them to backport 
fixes. (roberto)
 --
+smarty3 (Abhijith PA)
+--
 spotweb
   NOTE: 20201220: The affected code uses string concatenation to construct a 
SQL query.
   NOTE: 20201220: Upstream's "fix" is to blacklist all the "bad" SQL commands. 
(roberto)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/38c02cf161216beb63ec5f43bbecc228d16cd9c1

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/38c02cf161216beb63ec5f43bbecc228d16cd9c1
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to