[Git][security-tracker-team/security-tracker][master] 2 commits: CVE-2022-24790,puma: Mark as no-dsa for Stretch

Markus Koschany (@apo) apo at debian.org
Wed May 25 23:27:24 BST 2022



Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker


Commits:
00630d0c by Markus Koschany at 2022-05-26T00:01:19+02:00
CVE-2022-24790,puma: Mark as no-dsa for Stretch

Although all existing tests pass, the new test_requests_invalid tests never
seem to finish. It is currently not possible to determine if this is caused by
a failing test or a Puma bug. The error message is:

Error reached top of thread-pool

and might be related to

https://github.com/puma/puma/issues/1502

I have opted not to apply the patch because of that. The preliminary patch to
fix CVE-2022-24790 can be found at

https://people.debian.org/~apo/lts/stretch/puma/CVE-2022-24790.patch

Also remove the no-dsa tags for CVE-2019-16770 and CVE-2020-5247 because they
will be fixed in an upcoming security update.

- - - - -
1851ca48 by Markus Koschany at 2022-05-26T00:27:15+02:00
Reserve DLA-3023-1 for puma

- - - - -


3 changed files:

- data/CVE/list
- data/DLA/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -19270,9 +19270,11 @@ CVE-2022-24791 (Wasmtime is a standalone JIT-style runtime for WebAssembly, usin
 CVE-2022-24790 (Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for R ...)
 	{DSA-5146-1}
 	- puma <unfixed> (bug #1008723)
+	[stretch] - puma <no-dsa> (possibly introduces regressions)
 	NOTE: https://github.com/puma/puma/security/advisories/GHSA-h99w-9q5r-gjq9
 	NOTE: https://github.com/puma/puma/commit/5bb7d202e24dec00a898dca4aa11db391d7787a5 (5-6-stable)
 	NOTE: https://github.com/puma/puma/commit/6c514e70f5ae0ff14c9b0091fa84bfa39b022025 (v5.6.3)
+	NOTE: https://people.debian.org/~apo/lts/stretch/puma/CVE-2022-24790.patch
 CVE-2022-24789 (C1 CMS is an open-source, .NET based Content Management System (CMS).  ...)
 	NOT-FOR-US: C1 CMS
 CVE-2022-24788 (Vyper is a pythonic Smart Contract Language for the ethereum virtual m ...)
@@ -168163,7 +168165,6 @@ CVE-2020-5248 (GLPI before before version 9.4.6 has a vulnerability involving a
 CVE-2020-5247 (In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application us ...)
 	- puma 3.12.4-1 (bug #952766)
 	[buster] - puma 3.12.0-2+deb10u2
-	[stretch] - puma <no-dsa> (intrusive to backport)
 	NOTE: https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v
 	NOTE: https://github.com/puma/puma/commit/1b17e85a06183cd169b41ca719928c26d44a6e03 (3.12.3)
 	NOTE: https://github.com/puma/puma/commit/694feafcd4fdcea786a0730701dad933f7547bea (4.3.2)
@@ -189179,7 +189180,6 @@ CVE-2019-16771 (Versions of Armeria 0.85.0 through and including 0.96.0 are vuln
 CVE-2019-16770 (In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client coul ...)
 	- puma 3.12.0-4 (bug #946312)
 	[buster] - puma 3.12.0-2+deb10u1
-	[stretch] - puma <no-dsa> (Minor issue)
 	NOTE: https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994
 	NOTE: https://github.com/puma/puma/commit/06053e60908074bb38293d4449ea261cb009b53e
 	NOTE: This is an incomplete fix. When fixing this issue make sure to also apply


=====================================
data/DLA/list
=====================================
@@ -1,3 +1,6 @@
+[26 May 2022] DLA-3023-1 puma - security update
+	{CVE-2019-16770 CVE-2020-5247 CVE-2022-23634}
+	[stretch] - puma 3.6.0-1+deb9u2
 [25 May 2022] DLA-3022-1 dpkg - security update
 	{CVE-2022-1664}
 	[stretch] - dpkg 1.18.26


=====================================
data/dla-needed.txt
=====================================
@@ -211,8 +211,6 @@ postgresql-9.6
   NOTE: 20220523: Christoph Berg won't handle this update (Beuc/front-desk)
   NOTE: 20220523: https://lists.debian.org/debian-lts/2022/05/msg00054.html
 --
-puma (Markus Koschany)
---
 puppet-module-puppetlabs-firewall
   NOTE: 20220402: no Debian maintainers activity since 2018 (Beuc/front-desk)
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/5c5c0f1163d86480b8940f88cdd8539f5e5f79fb...1851ca487ca36847ae270779b7f7348349f678df

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/5c5c0f1163d86480b8940f88cdd8539f5e5f79fb...1851ca487ca36847ae270779b7f7348349f678df
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220525/75a2bc25/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list