Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ac8b222c by Salvatore Bonaccorso at 2022-10-08T10:46:48+02:00
Add CVE-2021-41569/libiberty

- - - - -
7710fc49 by Salvatore Bonaccorso at 2022-10-08T10:46:50+02:00
Add tracking for binutils in CVE-2021-3826

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -75310,7 +75310,12 @@ CVE-2021-41570 (Veritas NetBackup OpsCenter Analytics 
9.1 allows XSS via the Net
 CVE-2021-41569 (SAS/Intrnet 9.4 build 1520 and earlier allows Local File 
Inclusion. Th ...)
        NOT-FOR-US: SAS/Intrnet
 CVE-2021-3826 (Heap/stack buffer overflow in the dlang_lname function in 
d-demangle.c ...)
-       TODO: check
+       - binutils 2.37.50.20220121-1 (unimportant)
+       - libiberty 20220713-1
+       [bullseye] - libiberty <no-dsa> (Minor issue)
+       NOTE: 
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579985.html
+       NOTE: 
https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=5481040197402be6dfee265bd2ff5a4c88e30505
+       NOTE: binutils not covered by security support
 CVE-2021-41568 (Tad Web is vulnerable to authorization bypass, thus remote 
attackers c ...)
        NOT-FOR-US: Tad Web
 CVE-2021-41567 (The new add subject parameter of Tad Uploader view book list 
function  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/4b2518e48bec2cd08b215b133ed913070ac2a791...7710fc493a87dc08efdb79556e0f2b6447c1de80

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/4b2518e48bec2cd08b215b133ed913070ac2a791...7710fc493a87dc08efdb79556e0f2b6447c1de80
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to