SHA256
1
0
forked from pool/busybox

Accepting request 946463 from home:radolin:branches:Base:System

Fix incorrect bugzilla numbers for CVE-2017-15874 and CVE-2019-5747

OBS-URL: https://build.opensuse.org/request/show/946463
OBS-URL: https://build.opensuse.org/package/show/Base:System/busybox?expand=0&rev=98
This commit is contained in:
Radoslav Kolev 2022-01-14 16:27:43 +00:00 committed by Git OBS Bridge
parent d97fbe74ba
commit a525213321

View File

@ -14,8 +14,8 @@ Thu Jan 6 06:37:24 UTC 2022 - Radoslav Kolev <radoslav.kolev@suse.com>
* CVE-2016-2148 (bsc#970662): heap-based buffer overflow in OPTION_6RD parsing
* CVE-2016-6301 (bsc#991940): NTP server denial of service flaw
* CVE-2017-15873 (bsc#1064976): The get_next_block function in archival/libarchive/decompress_bunzip2.c has an Integer Overflow
* CVE-2017-15874 (bsc#1064976): archival/libarchive/decompress_unlzma.c has an Integer Underflow
* CVE-2019-5747 (bsc#1064976): out of bounds read in udhcp components
* CVE-2017-15874 (bsc#1064978): archival/libarchive/decompress_unlzma.c has an Integer Underflow
* CVE-2019-5747 (bsc#1121428): out of bounds read in udhcp components
* CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376,
CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380,
CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384,