diff options
author | Thorsten Alteholz <debian@alteholz.de> | 2022-01-24 00:13:38 +0100 |
---|---|---|
committer | Thorsten Alteholz <debian@alteholz.de> | 2022-01-24 00:13:38 +0100 |
commit | a080a00b73ce11b5f58088f6f01c4d5ef9480ff1 (patch) | |
tree | 5de92338c993ab9529a1e9f0ee1d3bf3ce9af635 | |
parent | 21a53f59c56974c0ffb39178b70b7b368b4a4ce6 (diff) |
mark CVE-2021-45942 as no-dsa for Stretch
-rw-r--r-- | data/CVE/list.2021 | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/list.2021 b/data/CVE/list.2021 index 21c0da3d86..0dde89e9dd 100644 --- a/data/CVE/list.2021 +++ b/data/CVE/list.2021 @@ -1123,6 +1123,7 @@ CVE-2021-45943 (GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCI NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2021-1651.yaml CVE-2021-45942 (OpenEXR 3.1.0 through 3.1.3 has a heap-based buffer overflow in Imf_3_ ...) - openexr <unfixed> + [buster] - openexr <no-dsa> (Minor issue) NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416 NOTE: https://github.com/AcademySoftwareFoundation/openexr/pull/1209 CVE-2021-45941 (libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in _ ...) |