[Secure-testing-commits] r57136 - in data: . CVE
Antoine Beaupré
anarcat at moszumanska.debian.org
Mon Oct 30 18:46:07 UTC 2017
Author: anarcat
Date: 2017-10-30 18:46:07 +0000 (Mon, 30 Oct 2017)
New Revision: 57136
Modified:
data/CVE/list
data/dla-needed.txt
Log:
no version of puppet in debian is affected by CVE-2016-5714
agent 1.3.6 is puppet 4.3.2 and 1.7.1 is 4.7.0, so no version is vulnerable
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-10-30 14:06:32 UTC (rev 57135)
+++ data/CVE/list 2017-10-30 18:46:07 UTC (rev 57136)
@@ -59048,8 +59048,13 @@
CVE-2016-5715 (Open redirect vulnerability in the Console in Puppet Enterprise 2015.x ...)
- puppet <not-affected> (Limited to Puppet Enterprise)
CVE-2016-5714 (Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet ...)
- - puppet <unfixed>
- TODO: check
+ - puppet 4.8.0-1
+ [wheezy] - puppet <not-affected> (Vulnerable code introduced later)
+ [jessie] - puppet <not-affected> (Vulnerable code introduced later)
+ NOTE: https://puppet.com/security/cve/pxp-agent-oct-2016
+ NOTE: triaged away in Ubuntu: "Default configurations of FOSS Puppet Agent are not vulnerable."
+ NOTE: gentoo released a fix: https://security.gentoo.org/glsa/201710-12
+ NOTE: rosetta stone for puppet version numbers: https://puppet.com/docs/puppet/4.10/about_agent.html
CVE-2016-5713
RESERVED
CVE-2016-5712
Modified: data/dla-needed.txt
===================================================================
--- data/dla-needed.txt 2017-10-30 14:06:32 UTC (rev 57135)
+++ data/dla-needed.txt 2017-10-30 18:46:07 UTC (rev 57136)
@@ -93,8 +93,6 @@
NOTE: drawForm is doForm1 in wheezy
NOTE: exploit does not loop but code looks affected
--
-puppet
---
python-werkzeug (Thorsten Alteholz)
--
quagga (Hugo Lefeuvre)
More information about the Secure-testing-commits
mailing list