diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2022-01-24 16:28:45 +0100 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2022-01-24 16:28:45 +0100 |
commit | 3992b41015c6f3d72087f8eeece06c05b06d972b (patch) | |
tree | 5ec102b3eb9d8b4e5c2aad74f786b64ce21c3b31 | |
parent | c0510cc1038bf93656ef3e8f34b6786161cd0426 (diff) |
add oss-sec reference to two glibc issues
-rw-r--r-- | data/CVE/2021.list | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/data/CVE/2021.list b/data/CVE/2021.list index 4bf79f0718..d5d94e2615 100644 --- a/data/CVE/2021.list +++ b/data/CVE/2021.list @@ -6104,6 +6104,7 @@ CVE-2021-3999 [Off-by-one buffer overflow/underflow in getcwd()] [buster] - glibc <no-dsa> (Minor issue) [stretch] - glibc <no-dsa> (Minor issue) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28769 + NOTE: https://www.openwall.com/lists/oss-security/2022/01/24/4 CVE-2021-3998 [Unexpected return value from realpath() for too long results] RESERVED - glibc <unfixed> @@ -6112,6 +6113,7 @@ CVE-2021-3998 [Unexpected return value from realpath() for too long results] [stretch] - glibc <no-dsa> (Minor issue) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28770 NOTE: https://patchwork.sourceware.org/project/glibc/patch/20220113055920.3155918-1-siddhesh@sourceware.org/ + NOTE: https://www.openwall.com/lists/oss-security/2022/01/24/4 CVE-2021-3997 [Uncontrolled recursion in systemd's systemd-tmpfiles] RESERVED - systemd 250.2-1 (bug #1003467) |