summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2020-09-18 18:15:11 +0200
committerMoritz Muehlenhoff <jmm@debian.org>2020-09-18 18:15:11 +0200
commiteda072ac3f052abb437d8fcb7fcb4421797d4523 (patch)
tree704cb7b52ee1993338c8564dc67e4342f3496b01
parent9016a60d2964ce3084d394e8dd038ee8c6fa8619 (diff)
puppet n/a
add link to Samba advisory
-rw-r--r--data/CVE/2018.list5
-rw-r--r--data/CVE/2019.list2
-rw-r--r--data/CVE/2020.list1
3 files changed, 3 insertions, 5 deletions
diff --git a/data/CVE/2018.list b/data/CVE/2018.list
index 15f71f0ad6..97cc50d808 100644
--- a/data/CVE/2018.list
+++ b/data/CVE/2018.list
@@ -25234,10 +25234,7 @@ CVE-2018-11753
CVE-2018-11752 (Previous releases of the Puppet cisco_ios module output SSH session de ...)
NOT-FOR-US: cisco_ios Puppet module
CVE-2018-11751 (Previous versions of Puppet Agent didn't verify the peer in the SSL co ...)
- - puppet <unfixed> (bug #952925)
- [buster] - puppet <no-dsa> (Minor issue)
- [stretch] - puppet <no-dsa> (Minor issue)
- [jessie] - puppet <ignored> (Patch too invasive to backport, minor issue)
+ - puppet <not-affected> (Only affects 6.x, see #952925)
NOTE: https://puppet.com/security/cve/CVE-2018-11751/
NOTE: https://tickets.puppetlabs.com/browse/PUP-9459
NOTE: https://github.com/puppetlabs/puppet/commit/b49c11b6425738441d6f33285d2630fa434a123e
diff --git a/data/CVE/2019.list b/data/CVE/2019.list
index 20e05fba1e..e0943ea1f2 100644
--- a/data/CVE/2019.list
+++ b/data/CVE/2019.list
@@ -48612,7 +48612,7 @@ CVE-2019-2212 (In poisson_distribution of random, there is an out of bounds read
[stretch] - libc++ <no-dsa> (Minor issue)
[jessie] - libc++ <no-dsa> (Minor issue, Jessie versions of software that uses poisson distribution have low popcon)
- llvm-toolchain-6.0 <unfixed>
- [buster] - llvm-toolchain-6.0 <no-dsa> (Minor issue)
+ [buster] - llvm-toolchain-6.0 <ignored> (Minor issue)
[jessie] - llvm-toolchain-6.0 <no-dsa> (Minor issue, Jessie versions of software that uses poisson distribution have low popcon)
- llvm-toolchain-8 <unfixed>
NOTE: https://android.googlesource.com/platform/external/libcxx/+/4cebe6f1f01a34546b3b843b5267619a61bd7d39
diff --git a/data/CVE/2020.list b/data/CVE/2020.list
index df32d87e65..cadfbbee9b 100644
--- a/data/CVE/2020.list
+++ b/data/CVE/2020.list
@@ -54235,6 +54235,7 @@ CVE-2020-1472 (An elevation of privilege vulnerability exists when an attacker e
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14497
NOTE: Mitigation: server schannel = yes; but code changes planned.
NOTE: https://www.openwall.com/lists/oss-security/2020/09/17/2
+ NOTE: https://www.samba.org/samba/security/CVE-2020-1472.html
CVE-2020-1471 (An elevation of privilege vulnerability exists when Microsoft Windows ...)
NOT-FOR-US: Microsoft
CVE-2020-1470 (An elevation of privilege vulnerability exists when the Windows Work F ...)

© 2014-2024 Faster IT GmbH | imprint | privacy policy