Your message dated Sun, 20 Mar 2022 00:34:01 +0000
with message-id <e1nvjwd-000ats...@fasolo.debian.org>
and subject line Bug#996098: fixed in libxsmm 1.17-1
has caused the Debian Bug report #996098,
regarding libxsmm: CVE-2021-39535 CVE-2021-39536
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
996098: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996098
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libxsmm
Version: 1.9-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for libxsmm.

CVE-2021-39535[0]:
| An issue was discovered in libxsmm through v1.16.1-93. A NULL pointer
| dereference exists in JIT code. It allows an attacker to cause Denial
| of Service.


CVE-2021-39536[1]:
| An issue was discovered in libxsmm through v1.16.1-93. The JIT code
| has a heap-based buffer overflow.

Severity is slight overrated here, but making it RC to make sure fixed
version can land in bookworm.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-39535
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39535
[1] https://security-tracker.debian.org/tracker/CVE-2021-39536
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39536

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: libxsmm
Source-Version: 1.17-1
Done: Boyuan Yang <by...@debian.org>

We believe that the bug you reported is fixed in the latest version of
libxsmm, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 996...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Boyuan Yang <by...@debian.org> (supplier of updated libxsmm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 19 Mar 2022 20:01:55 -0400
Source: libxsmm
Architecture: source
Version: 1.17-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Science Maintainers 
<debian-science-maintain...@lists.alioth.debian.org>
Changed-By: Boyuan Yang <by...@debian.org>
Closes: 917526 962949 996098
Changes:
 libxsmm (1.17-1) unstable; urgency=medium
 .
   * New upstream version 1.17.
     + Fix old CVEs:
       - CVE-2018-20541
       - CVE-2018-20542 (Closes: #917526)
       - CVE-2021-39535
       - CVE-2021-39536 (Closes: #996098)
   * Add myself as package uploader. (Closes: #962949)
   * debian/control: Use up-to-date homepage information.
   * Bump Standards-Version to 4.6.0.
   * debian/rules: Use vanilla build for now.
   * debian/docs: Also install upstream documentation.
   * debian/patches: Refresh patches:
     + Makefile_rebuild_fix.patch: Refreshed.
     - 0004-Force-python3.patch: Dropped, useless.
     - destdir.patch: Dropped for now.
     - remove_stdc++_link.patch: Dropped for now.
   * debian/patches: Add new patches:
     + 0002-Makefile-fix-pkgconfigdir.patch: Fix pkgconfigdir.
Checksums-Sha1:
 219ad1d609fff1a754154721f8a04f86e9c77d00 2016 libxsmm_1.17-1.dsc
 aa92d10675cbff54aacd72a369e540ce85b1badd 2528419 libxsmm_1.17.orig.tar.gz
 9bc4c5b9a2da59e9252a67c64a5d816a3617ad1a 3348 libxsmm_1.17-1.debian.tar.xz
 b2fbd44e71ad227fa2c213d0a4a5588d3f96483e 6854 libxsmm_1.17-1_amd64.buildinfo
Checksums-Sha256:
 bc5fa24e832d8bd7aa8eb984d1b34c684c4f2ef9ed03a62f05659f8842cde706 2016 
libxsmm_1.17-1.dsc
 8b642127880e92e8a75400125307724635ecdf4020ca4481e5efe7640451bb92 2528419 
libxsmm_1.17.orig.tar.gz
 861fb6abf84907f11450065f532d46a11d799cdacda4b50dc58ac7f5226f8c1b 3348 
libxsmm_1.17-1.debian.tar.xz
 6c5230aa252c840a40cbd447bd8706ea2ead6da150e41c6bd78822e5712300b6 6854 
libxsmm_1.17-1_amd64.buildinfo
Files:
 57e2a7db824f3616487364f9a2e96cc4 2016 libs optional libxsmm_1.17-1.dsc
 bef3b02f8837b0eed1ea334045da0524 2528419 libs optional libxsmm_1.17.orig.tar.gz
 e92fd20f407ea5ef0e22fbbba057acb2 3348 libs optional 
libxsmm_1.17-1.debian.tar.xz
 030ad87fb7407d6b48ba5f4aab25abb4 6854 libs optional 
libxsmm_1.17-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=17YS
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to