diff options
author | Moritz Mühlenhoff <jmm@debian.org> | 2024-04-16 20:26:57 +0200 |
---|---|---|
committer | Moritz Mühlenhoff <jmm@debian.org> | 2024-04-16 20:28:15 +0200 |
commit | 5e466e744c1279408b3abfddd88f7825cf68f06b (patch) | |
tree | f7dd4cc29c468f895e4fec40f7b9598804394433 | |
parent | b9f3f0d61f4a48c56b5e53797a947dde2a7aff61 (diff) |
apache2 DSA
-rw-r--r-- | data/CVE/list | 6 | ||||
-rw-r--r-- | data/DSA/list | 4 | ||||
-rw-r--r-- | data/dsa-needed.txt | 2 |
3 files changed, 4 insertions, 8 deletions
diff --git a/data/CVE/list b/data/CVE/list index dadb3eab6f..e18664f2b8 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -39354,16 +39354,12 @@ CVE-2020-36698 (The Security & Malware scan by CleanTalk plugin for WordPress is NOT-FOR-US: WordPress plugin CVE-2023-45802 (When a HTTP/2 stream was reset (RST frame) by a client, there was a ti ...) - apache2 2.4.58-1 - [bookworm] - apache2 <no-dsa> (Minor issue) - [bullseye] - apache2 <no-dsa> (Minor issue) [buster] - apache2 <no-dsa> (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/10/19/6 NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-45802 NOTE: https://github.com/icing/blog/blob/main/h2-rapid-reset.md#cve-2023-45802 CVE-2023-43622 (An attacker, opening a HTTP/2 connection with an initial window size o ...) - apache2 2.4.58-1 - [bookworm] - apache2 <no-dsa> (Minor issue) - [bullseye] - apache2 <no-dsa> (Minor issue) [buster] - apache2 <not-affected> (Vulnerable code introduced later) NOTE: https://www.openwall.com/lists/oss-security/2023/10/19/5 NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-43622 @@ -62180,8 +62176,6 @@ CVE-2023-2258 (Improper Neutralization of Formula Elements in a CSV File in GitH NOT-FOR-US: Alf.io CVE-2023-31122 (Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.Th ...) - apache2 2.4.58-1 - [bookworm] - apache2 <no-dsa> (Minor issue) - [bullseye] - apache2 <no-dsa> (Minor issue) [buster] - apache2 <no-dsa> (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/10/19/4 NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-31122 diff --git a/data/DSA/list b/data/DSA/list index d1f5e885be..579b24e15f 100644 --- a/data/DSA/list +++ b/data/DSA/list @@ -1,3 +1,7 @@ +[16 Apr 2024] DSA-5662-1 apache2 - security update + {CVE-2023-31122 CVE-2023-38709 CVE-2023-43622 CVE-2023-45802 CVE-2024-24795 CVE-2024-27316} + [bullseye] - apache2 2.4.59-1~deb11u1 + [bookworm] - apache2 2.4.59-1~deb12u1 [15 Apr 2024] DSA-5661-1 php8.2 - security update {CVE-2023-3823 CVE-2023-3824 CVE-2024-2756 CVE-2024-3096} [bookworm] - php8.2 8.2.18-1~deb12u1 diff --git a/data/dsa-needed.txt b/data/dsa-needed.txt index 20f918d809..8f023906ab 100644 --- a/data/dsa-needed.txt +++ b/data/dsa-needed.txt @@ -11,8 +11,6 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. -apache2 (jmm) --- cryptojs -- dav1d |