diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2022-01-24 16:28:45 +0100 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2022-01-24 16:28:45 +0100 |
commit | 1d1ea59f5cca95cd26f1db7ba2fc7824ecf29901 (patch) | |
tree | 1b8a2bdfa78ab6cd6c023e8fe12ded45bc90ea13 | |
parent | e8e35d5caf7e9fb91e7381cb440b49aa92ed88f5 (diff) |
add oss-sec reference to two glibc issues
-rw-r--r-- | data/CVE/list.2021 | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/data/CVE/list.2021 b/data/CVE/list.2021 index 4bf79f0718..d5d94e2615 100644 --- a/data/CVE/list.2021 +++ b/data/CVE/list.2021 @@ -6104,6 +6104,7 @@ CVE-2021-3999 [Off-by-one buffer overflow/underflow in getcwd()] [buster] - glibc <no-dsa> (Minor issue) [stretch] - glibc <no-dsa> (Minor issue) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28769 + NOTE: https://www.openwall.com/lists/oss-security/2022/01/24/4 CVE-2021-3998 [Unexpected return value from realpath() for too long results] RESERVED - glibc <unfixed> @@ -6112,6 +6113,7 @@ CVE-2021-3998 [Unexpected return value from realpath() for too long results] [stretch] - glibc <no-dsa> (Minor issue) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28770 NOTE: https://patchwork.sourceware.org/project/glibc/patch/20220113055920.3155918-1-siddhesh@sourceware.org/ + NOTE: https://www.openwall.com/lists/oss-security/2022/01/24/4 CVE-2021-3997 [Uncontrolled recursion in systemd's systemd-tmpfiles] RESERVED - systemd 250.2-1 (bug #1003467) |