summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2024-05-01 13:42:52 +0200
committerMoritz Muehlenhoff <jmm@debian.org>2024-05-01 13:42:52 +0200
commiteab15f762399244e52d807e3cac595e6700be8f9 (patch)
treeb9e164ae84c3369a9b97f43a28b68afc9bd789bd
parentcc8f9c9c1911feb00ab85d93b709c9cb7dcb777d (diff)
bullseye triage
-rw-r--r--data/CVE/list19
-rw-r--r--data/dsa-needed.txt2
2 files changed, 14 insertions, 7 deletions
diff --git a/data/CVE/list b/data/CVE/list
index b0d1c3731b..5e3fa51142 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -22378,7 +22378,7 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4
[bullseye] - knot-resolver <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used)
[buster] - knot-resolver <ignored> (Too intrusive to backport)
- pdns-recursor 4.9.3-1 (bug #1063852)
- [bullseye] - pdns-recursor <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used)
+ [bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye)
- unbound 1.19.1-1 (bug #1063845)
- systemd 255.4-1
[bookworm] - systemd <no-dsa> (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release)
@@ -22420,7 +22420,7 @@ CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 51
[bullseye] - knot-resolver <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used)
[buster] - knot-resolver <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used)
- pdns-recursor 4.9.3-1 (bug #1063852)
- [bullseye] - pdns-recursor <ignored> (Too intrusive to backport, if DNSSEC is used Bookworm can be used)
+ [bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye)
- unbound 1.19.1-1 (bug #1063845)
- systemd 255.4-1
[bookworm] - systemd <no-dsa> (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release)
@@ -41844,6 +41844,7 @@ CVE-2015-20110 (JHipster generator-jhipster before 2.23.0 allows a timing attack
NOT-FOR-US: JHipster generator-jhipster
CVE-2023-34049 [allows an attacker to force Salt-SSH to run their script]
- salt <removed> (bug #1055179)
+ [bullseye] - salt <ignored> (Scheduled for removal)
[buster] - salt <end-of-life> (EOL in buster LTS)
NOTE: https://saltproject.io/security-announcements/2023-10-27-advisory/index.html
CVE-2023-5844 (Unverified Password Change in GitHub repository pimcore/admin-ui-class ...)
@@ -64221,6 +64222,7 @@ CVE-2023-28370 (Open redirect vulnerability in Tornado versions 6.3.1 and earlie
[bullseye] - python-tornado <no-dsa> (Minor issue)
[buster] - python-tornado <no-dsa> (Minor issue)
- salt <removed> (bug #1059297)
+ [bullseye] - salt <ignored> (Scheduled for removal)
[buster] - salt <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/tornadoweb/tornado/commit/32ad07c54e607839273b4e1819c347f5c8976b2f (v6.3.2)
CVE-2023-27529 (Wacom Tablet Driver installer prior to 6.4.2-1 (for macOS) contains an ...)
@@ -81150,7 +81152,7 @@ CVE-2023-26438 (External service lookups for a number of protocols were vulnerab
NOT-FOR-US: OX App Suite
CVE-2023-26437 (Denial of service vulnerability in PowerDNS Recursor allows authoritat ...)
- pdns-recursor 4.8.4-1 (bug #1033941)
- [bullseye] - pdns-recursor <no-dsa> (Minor issue)
+ [bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye)
[buster] - pdns-recursor <no-dsa> (Minor issue)
NOTE: https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2023-02.html
NOTE: https://github.com/PowerDNS/pdns/commit/94fccab63457f8327add3a8e1e2b7876234e4989 (rec-4.6.6)
@@ -107817,10 +107819,12 @@ CVE-2023-20899 (VMware SD-WAN (Edge) contains a bypass authentication vulnerabil
NOT-FOR-US: VMware
CVE-2023-20898 (Git Providers can read from the wrong environment because they get the ...)
- salt <removed> (bug #1051504)
+ [bullseye] - salt <ignored> (Scheduled for removal)
[buster] - salt <end-of-life> (EOL in buster LTS)
NOTE: https://saltproject.io/security-announcements/2023-08-10-advisory/
CVE-2023-20897 (Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. ...)
- salt <removed> (bug #1051504)
+ [bullseye] - salt <ignored> (Scheduled for removal)
[buster] - salt <end-of-life> (EOL in buster LTS)
NOTE: https://saltproject.io/security-announcements/2023-08-10-advisory/
NOTE: https://github.com/saltstack/salt/issues/64061
@@ -129284,7 +129288,7 @@ CVE-2022-37429 (Silverstripe silverstripe/framework through 4.11 allows XSS (iss
NOT-FOR-US: SilverStripe CMS
CVE-2022-37428 (PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when pro ...)
- pdns-recursor 4.7.2-1
- [bullseye] - pdns-recursor <no-dsa> (Minor issue)
+ [bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye)
[buster] - pdns-recursor <no-dsa> (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/08/23/1
NOTE: https://downloads.powerdns.com/patches/2022-02/
@@ -158499,7 +158503,7 @@ CVE-2022-27228 (In the vote (aka "Polls, Votes") module before 21.0.100 of Bitri
NOT-FOR-US: Bitrix Site Manager
CVE-2022-27227 (In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and ...)
- pdns-recursor 4.6.1-1
- [bullseye] - pdns-recursor <no-dsa> (Minor issue)
+ [bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye)
[buster] - pdns-recursor <no-dsa> (Minor issue)
[stretch] - pdns-recursor <no-dsa> (Minor issue)
NOTE: https://github.com/PowerDNS/pdns/commit/ff27c8c8e17bd8093e4668d88865b8eb71039b45 (rec-4.4.8)
@@ -172435,6 +172439,7 @@ CVE-2022-22968 (In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and
NOTE: Only supported for building applications shipped in Debian, see README.Debian.security
CVE-2022-22967 (An issue was discovered in SaltStack Salt in versions before 3002.9, 3 ...)
- salt <removed> (bug #1013872)
+ [bullseye] - salt <ignored> (Scheduled for removal)
[buster] - salt <end-of-life> (EOL in buster LTS)
NOTE: https://saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/
NOTE: Fixed by: https://github.com/saltstack/salt/commit/e068a34ccb2e17ae7224f8016a24b727f726d4c8 (v3004.2)
@@ -172502,6 +172507,7 @@ CVE-2022-22942 (The vmwgfx driver contains a local privilege escalation vulnerab
NOTE: https://github.com/opensrcsec/same_type_object_reuse_exploits/blob/main/cve-2022-22942.c
CVE-2022-22941 (An issue was discovered in SaltStack Salt in versions before 3002.8, 3 ...)
- salt 3004.1+dfsg-1 (bug #1008945)
+ [bullseye] - salt <ignored> (Scheduled for removal)
[buster] - salt <end-of-life> (EOL in buster LTS)
NOTE: https://saltproject.io/security_announcements/salt-security-advisory-release/
CVE-2022-22940
@@ -172514,14 +172520,17 @@ CVE-2022-22937
RESERVED
CVE-2022-22936 (An issue was discovered in SaltStack Salt in versions before 3002.8, 3 ...)
- salt 3004.1+dfsg-1 (bug #1008945)
+ [bullseye] - salt <ignored> (Scheduled for removal)
[buster] - salt <end-of-life> (EOL in buster LTS)
NOTE: https://saltproject.io/security_announcements/salt-security-advisory-release/
CVE-2022-22935 (An issue was discovered in SaltStack Salt in versions before 3002.8, 3 ...)
- salt 3004.1+dfsg-1 (bug #1008945)
+ [bullseye] - salt <ignored> (Scheduled for removal)
[buster] - salt <end-of-life> (EOL in buster LTS)
NOTE: https://saltproject.io/security_announcements/salt-security-advisory-release/
CVE-2022-22934 (An issue was discovered in SaltStack Salt in versions before 3002.8, 3 ...)
- salt 3004.1+dfsg-1 (bug #1008945)
+ [bullseye] - salt <ignored> (Scheduled for removal)
[buster] - salt <end-of-life> (EOL in buster LTS)
NOTE: https://saltproject.io/security_announcements/salt-security-advisory-release/
CVE-2022-22933
diff --git a/data/dsa-needed.txt b/data/dsa-needed.txt
index 5848b2b60d..2fbf534b00 100644
--- a/data/dsa-needed.txt
+++ b/data/dsa-needed.txt
@@ -82,8 +82,6 @@ ruby-sinatra/oldstable
--
ruby-tzinfo/oldstable
--
-salt/oldstable
---
squid
--
webkit2gtk (berto)

© 2014-2024 Faster IT GmbH | imprint | privacy policy