[Git][security-tracker-team/security-tracker][master] Mark puppet as removed from unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Oct 4 20:02:36 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
876c51e7 by Salvatore Bonaccorso at 2022-10-04T21:02:09+02:00
Mark puppet as removed from unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -111548,7 +111548,7 @@ CVE-2021-27027 (An Out-Of-Bounds Read Vulnerability in Autodesk FBX Review versi
 CVE-2021-27026 (A flaw was divered in Puppet Enterprise and other Puppet products wher ...)
 	NOT-FOR-US: Puppet Enterprise
 CVE-2021-27025 (A flaw was discovered in Puppet Agent where the agent may silently ign ...)
-	- puppet <unfixed> (bug #1014772)
+	- puppet <removed> (bug #1014772)
 	[bullseye] - puppet <ignored> (Minor issue, too intrusive to backport)
 	[buster] - puppet <ignored> (Minor issue, too intrusive to backport)
 	[stretch] - puppet <ignored> (Minor issue, too intrusive to backport)
@@ -111558,7 +111558,7 @@ CVE-2021-27025 (A flaw was discovered in Puppet Agent where the agent may silent
 CVE-2021-27024 (A flaw was discovered in Continuous Delivery for Puppet Enterprise (CD ...)
 	NOT-FOR-US: Continuous Delivery for Puppet Enterprise
 CVE-2021-27023 (A flaw was discovered in Puppet Agent and Puppet Server that may resul ...)
-	- puppet <unfixed>
+	- puppet <removed>
 	[bullseye] - puppet <ignored> (Minor issue)
 	[buster] - puppet <ignored> (Minor issue)
 	[stretch] - puppet <ignored> (Minor issue)
@@ -190893,7 +190893,7 @@ CVE-2020-7943 (Puppet Server and PuppetDB provide useful performance and debuggi
 	NOTE: https://puppet.com/security/cve/CVE-2020-7943/
 	NOTE: https://github.com/puppetlabs/puppet_metrics_dashboard/pull/92
 CVE-2020-7942 (Previously, Puppet operated on a model that a node with a valid certif ...)
-	- puppet <unfixed> (unimportant)
+	- puppet <removed> (unimportant)
 	NOTE: This CVE assignment is for switching the default setting of strict_hostname_checking,
 	NOTE: the option is available in older Puppet releases (such as 4.8 from Stretch)
 	NOTE: https://puppet.com/security/cve/CVE-2020-7942/



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/876c51e785b9aa32c924471b928cddc3e270d961

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/876c51e785b9aa32c924471b928cddc3e270d961
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221004/d23a6d27/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list