From eda072ac3f052abb437d8fcb7fcb4421797d4523 Mon Sep 17 00:00:00 2001 From: Moritz Muehlenhoff Date: Fri, 18 Sep 2020 18:15:11 +0200 Subject: puppet n/a add link to Samba advisory --- data/CVE/2018.list | 5 +---- data/CVE/2019.list | 2 +- data/CVE/2020.list | 1 + 3 files changed, 3 insertions(+), 5 deletions(-) diff --git a/data/CVE/2018.list b/data/CVE/2018.list index 15f71f0ad6..97cc50d808 100644 --- a/data/CVE/2018.list +++ b/data/CVE/2018.list @@ -25234,10 +25234,7 @@ CVE-2018-11753 CVE-2018-11752 (Previous releases of the Puppet cisco_ios module output SSH session de ...) NOT-FOR-US: cisco_ios Puppet module CVE-2018-11751 (Previous versions of Puppet Agent didn't verify the peer in the SSL co ...) - - puppet (bug #952925) - [buster] - puppet (Minor issue) - [stretch] - puppet (Minor issue) - [jessie] - puppet (Patch too invasive to backport, minor issue) + - puppet (Only affects 6.x, see #952925) NOTE: https://puppet.com/security/cve/CVE-2018-11751/ NOTE: https://tickets.puppetlabs.com/browse/PUP-9459 NOTE: https://github.com/puppetlabs/puppet/commit/b49c11b6425738441d6f33285d2630fa434a123e diff --git a/data/CVE/2019.list b/data/CVE/2019.list index 20e05fba1e..e0943ea1f2 100644 --- a/data/CVE/2019.list +++ b/data/CVE/2019.list @@ -48612,7 +48612,7 @@ CVE-2019-2212 (In poisson_distribution of random, there is an out of bounds read [stretch] - libc++ (Minor issue) [jessie] - libc++ (Minor issue, Jessie versions of software that uses poisson distribution have low popcon) - llvm-toolchain-6.0 - [buster] - llvm-toolchain-6.0 (Minor issue) + [buster] - llvm-toolchain-6.0 (Minor issue) [jessie] - llvm-toolchain-6.0 (Minor issue, Jessie versions of software that uses poisson distribution have low popcon) - llvm-toolchain-8 NOTE: https://android.googlesource.com/platform/external/libcxx/+/4cebe6f1f01a34546b3b843b5267619a61bd7d39 diff --git a/data/CVE/2020.list b/data/CVE/2020.list index df32d87e65..cadfbbee9b 100644 --- a/data/CVE/2020.list +++ b/data/CVE/2020.list @@ -54235,6 +54235,7 @@ CVE-2020-1472 (An elevation of privilege vulnerability exists when an attacker e NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14497 NOTE: Mitigation: server schannel = yes; but code changes planned. NOTE: https://www.openwall.com/lists/oss-security/2020/09/17/2 + NOTE: https://www.samba.org/samba/security/CVE-2020-1472.html CVE-2020-1471 (An elevation of privilege vulnerability exists when Microsoft Windows ...) NOT-FOR-US: Microsoft CVE-2020-1470 (An elevation of privilege vulnerability exists when the Windows Work F ...) -- cgit v1.2.3