summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMoritz Mühlenhoff <jmm@debian.org>2024-04-16 20:26:57 +0200
committerMoritz Mühlenhoff <jmm@debian.org>2024-04-16 20:28:15 +0200
commit5e466e744c1279408b3abfddd88f7825cf68f06b (patch)
treef7dd4cc29c468f895e4fec40f7b9598804394433
parentb9f3f0d61f4a48c56b5e53797a947dde2a7aff61 (diff)
apache2 DSA
-rw-r--r--data/CVE/list6
-rw-r--r--data/DSA/list4
-rw-r--r--data/dsa-needed.txt2
3 files changed, 4 insertions, 8 deletions
diff --git a/data/CVE/list b/data/CVE/list
index dadb3eab6f..e18664f2b8 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -39354,16 +39354,12 @@ CVE-2020-36698 (The Security & Malware scan by CleanTalk plugin for WordPress is
NOT-FOR-US: WordPress plugin
CVE-2023-45802 (When a HTTP/2 stream was reset (RST frame) by a client, there was a ti ...)
- apache2 2.4.58-1
- [bookworm] - apache2 <no-dsa> (Minor issue)
- [bullseye] - apache2 <no-dsa> (Minor issue)
[buster] - apache2 <no-dsa> (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/10/19/6
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-45802
NOTE: https://github.com/icing/blog/blob/main/h2-rapid-reset.md#cve-2023-45802
CVE-2023-43622 (An attacker, opening a HTTP/2 connection with an initial window size o ...)
- apache2 2.4.58-1
- [bookworm] - apache2 <no-dsa> (Minor issue)
- [bullseye] - apache2 <no-dsa> (Minor issue)
[buster] - apache2 <not-affected> (Vulnerable code introduced later)
NOTE: https://www.openwall.com/lists/oss-security/2023/10/19/5
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-43622
@@ -62180,8 +62176,6 @@ CVE-2023-2258 (Improper Neutralization of Formula Elements in a CSV File in GitH
NOT-FOR-US: Alf.io
CVE-2023-31122 (Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.Th ...)
- apache2 2.4.58-1
- [bookworm] - apache2 <no-dsa> (Minor issue)
- [bullseye] - apache2 <no-dsa> (Minor issue)
[buster] - apache2 <no-dsa> (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/10/19/4
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-31122
diff --git a/data/DSA/list b/data/DSA/list
index d1f5e885be..579b24e15f 100644
--- a/data/DSA/list
+++ b/data/DSA/list
@@ -1,3 +1,7 @@
+[16 Apr 2024] DSA-5662-1 apache2 - security update
+ {CVE-2023-31122 CVE-2023-38709 CVE-2023-43622 CVE-2023-45802 CVE-2024-24795 CVE-2024-27316}
+ [bullseye] - apache2 2.4.59-1~deb11u1
+ [bookworm] - apache2 2.4.59-1~deb12u1
[15 Apr 2024] DSA-5661-1 php8.2 - security update
{CVE-2023-3823 CVE-2023-3824 CVE-2024-2756 CVE-2024-3096}
[bookworm] - php8.2 8.2.18-1~deb12u1
diff --git a/data/dsa-needed.txt b/data/dsa-needed.txt
index 20f918d809..8f023906ab 100644
--- a/data/dsa-needed.txt
+++ b/data/dsa-needed.txt
@@ -11,8 +11,6 @@ To pick an issue, simply add your uid behind it.
If needed, specify the release by adding a slash after the name of the source package.
-apache2 (jmm)
---
cryptojs
--
dav1d

© 2014-2024 Faster IT GmbH | imprint | privacy policy