[Git][security-tracker-team/security-tracker][master] 4 commits: Add Debian bug reference for CVE-2022-24761/waitress
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Mar 20 15:34:42 GMT 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
14c8d478 by Salvatore Bonaccorso at 2022-03-20T16:00:38+01:00
Add Debian bug reference for CVE-2022-24761/waitress
- - - - -
2eeb76bf by Salvatore Bonaccorso at 2022-03-20T16:34:03+01:00
Track fixed version for CVE-2022-20001/fish via unstable
- - - - -
abe78a05 by Salvatore Bonaccorso at 2022-03-20T16:34:04+01:00
Add Debian bug reference for CVE-2022-21698
- - - - -
12812e87 by Salvatore Bonaccorso at 2022-03-20T16:34:05+01:00
Add Debian bug reference for CVE-2022-0547/openvpn
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -6736,7 +6736,7 @@ CVE-2022-24763
CVE-2022-24762 (sysend.js is a library that allows a user to send messages between pag ...)
TODO: check
CVE-2022-24761 (Waitress is a Web Server Gateway Interface server for Python 2 and 3. ...)
- - waitress <unfixed>
+ - waitress <unfixed> (bug #1008013)
NOTE: https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
NOTE: https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0 (v2.1.1)
CVE-2022-24760 (Parse Server is an open source http web server backend. In versions pr ...)
@@ -7044,7 +7044,7 @@ CVE-2022-24670
CVE-2022-24669
RESERVED
CVE-2022-0547 (OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass ...)
- - openvpn <unfixed>
+ - openvpn <unfixed> (bug #1008015)
NOTE: https://community.openvpn.net/openvpn/wiki/CVE-2022-0547
CVE-2022-0546 (A missing bounds check in the image loader used in Blender 3.x and 2.9 ...)
- blender <unfixed>
@@ -22896,7 +22896,7 @@ CVE-2022-21699 (IPython (Interactive Python) is a command shell for interactive
NOTE: Testcase: https://github.com/ipython/ipython/commit/56665dfcf7df8690da46aab1278df8e47b14fe3b
NOTE: https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699
CVE-2022-21698 (client_golang is the instrumentation library for Go applications in Pr ...)
- - golang-github-prometheus-client-golang <unfixed>
+ - golang-github-prometheus-client-golang <unfixed> (bug #1008008)
NOTE: https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p
NOTE: https://github.com/prometheus/client_golang/pull/962
NOTE: https://github.com/prometheus/client_golang/pull/987
@@ -49837,7 +49837,7 @@ CVE-2021-34344 (A stack buffer overflow vulnerability has been reported to affec
CVE-2021-34343 (A stack buffer overflow vulnerability has been reported to affect QNAP ...)
NOT-FOR-US: QNAP
CVE-2022-20001 (fish is a command line shell. fish version 3.1.0 through version 3.3.1 ...)
- - fish <unfixed>
+ - fish 3.4.0+ds-1
[buster] - fish <not-affected> (Vulnerable code introduced later)
[stretch] - fish <not-affected> (Vulnerable code introduced later)
NOTE: https://github.com/fish-shell/fish-shell/security/advisories/GHSA-pj5f-6vxj-f5mq
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/01bba835f4290a9f2d29459759c5e1639ebc3dcb...12812e873d65cac2e0cb2af8b936dab273fbc862
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/01bba835f4290a9f2d29459759c5e1639ebc3dcb...12812e873d65cac2e0cb2af8b936dab273fbc862
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220320/9fca1bad/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list