diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2024-05-01 13:42:52 +0200 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2024-05-01 13:42:52 +0200 |
commit | eab15f762399244e52d807e3cac595e6700be8f9 (patch) | |
tree | b9e164ae84c3369a9b97f43a28b68afc9bd789bd | |
parent | cc8f9c9c1911feb00ab85d93b709c9cb7dcb777d (diff) |
bullseye triage
-rw-r--r-- | data/CVE/list | 19 | ||||
-rw-r--r-- | data/dsa-needed.txt | 2 |
2 files changed, 14 insertions, 7 deletions
diff --git a/data/CVE/list b/data/CVE/list index b0d1c3731b..5e3fa51142 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -22378,7 +22378,7 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4 [bullseye] - knot-resolver <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used) [buster] - knot-resolver <ignored> (Too intrusive to backport) - pdns-recursor 4.9.3-1 (bug #1063852) - [bullseye] - pdns-recursor <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used) + [bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye) - unbound 1.19.1-1 (bug #1063845) - systemd 255.4-1 [bookworm] - systemd <no-dsa> (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release) @@ -22420,7 +22420,7 @@ CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 51 [bullseye] - knot-resolver <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used) [buster] - knot-resolver <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used) - pdns-recursor 4.9.3-1 (bug #1063852) - [bullseye] - pdns-recursor <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used) + [bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye) - unbound 1.19.1-1 (bug #1063845) - systemd 255.4-1 [bookworm] - systemd <no-dsa> (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release) @@ -41844,6 +41844,7 @@ CVE-2015-20110 (JHipster generator-jhipster before 2.23.0 allows a timing attack NOT-FOR-US: JHipster generator-jhipster CVE-2023-34049 [allows an attacker to force Salt-SSH to run their script] - salt <removed> (bug #1055179) + [bullseye] - salt <ignored> (Scheduled for removal) [buster] - salt <end-of-life> (EOL in buster LTS) NOTE: https://saltproject.io/security-announcements/2023-10-27-advisory/index.html CVE-2023-5844 (Unverified Password Change in GitHub repository pimcore/admin-ui-class ...) @@ -64221,6 +64222,7 @@ CVE-2023-28370 (Open redirect vulnerability in Tornado versions 6.3.1 and earlie [bullseye] - python-tornado <no-dsa> (Minor issue) [buster] - python-tornado <no-dsa> (Minor issue) - salt <removed> (bug #1059297) + [bullseye] - salt <ignored> (Scheduled for removal) [buster] - salt <end-of-life> (EOL in buster LTS) NOTE: https://github.com/tornadoweb/tornado/commit/32ad07c54e607839273b4e1819c347f5c8976b2f (v6.3.2) CVE-2023-27529 (Wacom Tablet Driver installer prior to 6.4.2-1 (for macOS) contains an ...) @@ -81150,7 +81152,7 @@ CVE-2023-26438 (External service lookups for a number of protocols were vulnerab NOT-FOR-US: OX App Suite CVE-2023-26437 (Denial of service vulnerability in PowerDNS Recursor allows authoritat ...) - pdns-recursor 4.8.4-1 (bug #1033941) - [bullseye] - pdns-recursor <no-dsa> (Minor issue) + [bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye) [buster] - pdns-recursor <no-dsa> (Minor issue) NOTE: https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2023-02.html NOTE: https://github.com/PowerDNS/pdns/commit/94fccab63457f8327add3a8e1e2b7876234e4989 (rec-4.6.6) @@ -107817,10 +107819,12 @@ CVE-2023-20899 (VMware SD-WAN (Edge) contains a bypass authentication vulnerabil NOT-FOR-US: VMware CVE-2023-20898 (Git Providers can read from the wrong environment because they get the ...) - salt <removed> (bug #1051504) + [bullseye] - salt <ignored> (Scheduled for removal) [buster] - salt <end-of-life> (EOL in buster LTS) NOTE: https://saltproject.io/security-announcements/2023-08-10-advisory/ CVE-2023-20897 (Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. ...) - salt <removed> (bug #1051504) + [bullseye] - salt <ignored> (Scheduled for removal) [buster] - salt <end-of-life> (EOL in buster LTS) NOTE: https://saltproject.io/security-announcements/2023-08-10-advisory/ NOTE: https://github.com/saltstack/salt/issues/64061 @@ -129284,7 +129288,7 @@ CVE-2022-37429 (Silverstripe silverstripe/framework through 4.11 allows XSS (iss NOT-FOR-US: SilverStripe CMS CVE-2022-37428 (PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when pro ...) - pdns-recursor 4.7.2-1 - [bullseye] - pdns-recursor <no-dsa> (Minor issue) + [bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye) [buster] - pdns-recursor <no-dsa> (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/08/23/1 NOTE: https://downloads.powerdns.com/patches/2022-02/ @@ -158499,7 +158503,7 @@ CVE-2022-27228 (In the vote (aka "Polls, Votes") module before 21.0.100 of Bitri NOT-FOR-US: Bitrix Site Manager CVE-2022-27227 (In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and ...) - pdns-recursor 4.6.1-1 - [bullseye] - pdns-recursor <no-dsa> (Minor issue) + [bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye) [buster] - pdns-recursor <no-dsa> (Minor issue) [stretch] - pdns-recursor <no-dsa> (Minor issue) NOTE: https://github.com/PowerDNS/pdns/commit/ff27c8c8e17bd8093e4668d88865b8eb71039b45 (rec-4.4.8) @@ -172435,6 +172439,7 @@ CVE-2022-22968 (In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and NOTE: Only supported for building applications shipped in Debian, see README.Debian.security CVE-2022-22967 (An issue was discovered in SaltStack Salt in versions before 3002.9, 3 ...) - salt <removed> (bug #1013872) + [bullseye] - salt <ignored> (Scheduled for removal) [buster] - salt <end-of-life> (EOL in buster LTS) NOTE: https://saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/ NOTE: Fixed by: https://github.com/saltstack/salt/commit/e068a34ccb2e17ae7224f8016a24b727f726d4c8 (v3004.2) @@ -172502,6 +172507,7 @@ CVE-2022-22942 (The vmwgfx driver contains a local privilege escalation vulnerab NOTE: https://github.com/opensrcsec/same_type_object_reuse_exploits/blob/main/cve-2022-22942.c CVE-2022-22941 (An issue was discovered in SaltStack Salt in versions before 3002.8, 3 ...) - salt 3004.1+dfsg-1 (bug #1008945) + [bullseye] - salt <ignored> (Scheduled for removal) [buster] - salt <end-of-life> (EOL in buster LTS) NOTE: https://saltproject.io/security_announcements/salt-security-advisory-release/ CVE-2022-22940 @@ -172514,14 +172520,17 @@ CVE-2022-22937 RESERVED CVE-2022-22936 (An issue was discovered in SaltStack Salt in versions before 3002.8, 3 ...) - salt 3004.1+dfsg-1 (bug #1008945) + [bullseye] - salt <ignored> (Scheduled for removal) [buster] - salt <end-of-life> (EOL in buster LTS) NOTE: https://saltproject.io/security_announcements/salt-security-advisory-release/ CVE-2022-22935 (An issue was discovered in SaltStack Salt in versions before 3002.8, 3 ...) - salt 3004.1+dfsg-1 (bug #1008945) + [bullseye] - salt <ignored> (Scheduled for removal) [buster] - salt <end-of-life> (EOL in buster LTS) NOTE: https://saltproject.io/security_announcements/salt-security-advisory-release/ CVE-2022-22934 (An issue was discovered in SaltStack Salt in versions before 3002.8, 3 ...) - salt 3004.1+dfsg-1 (bug #1008945) + [bullseye] - salt <ignored> (Scheduled for removal) [buster] - salt <end-of-life> (EOL in buster LTS) NOTE: https://saltproject.io/security_announcements/salt-security-advisory-release/ CVE-2022-22933 diff --git a/data/dsa-needed.txt b/data/dsa-needed.txt index 5848b2b60d..2fbf534b00 100644 --- a/data/dsa-needed.txt +++ b/data/dsa-needed.txt @@ -82,8 +82,6 @@ ruby-sinatra/oldstable -- ruby-tzinfo/oldstable -- -salt/oldstable --- squid -- webkit2gtk (berto) |