[Git][security-tracker-team/security-tracker][master] Mark puppet as removed from unstable
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Oct 4 20:02:36 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
876c51e7 by Salvatore Bonaccorso at 2022-10-04T21:02:09+02:00
Mark puppet as removed from unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -111548,7 +111548,7 @@ CVE-2021-27027 (An Out-Of-Bounds Read Vulnerability in Autodesk FBX Review versi
CVE-2021-27026 (A flaw was divered in Puppet Enterprise and other Puppet products wher ...)
NOT-FOR-US: Puppet Enterprise
CVE-2021-27025 (A flaw was discovered in Puppet Agent where the agent may silently ign ...)
- - puppet <unfixed> (bug #1014772)
+ - puppet <removed> (bug #1014772)
[bullseye] - puppet <ignored> (Minor issue, too intrusive to backport)
[buster] - puppet <ignored> (Minor issue, too intrusive to backport)
[stretch] - puppet <ignored> (Minor issue, too intrusive to backport)
@@ -111558,7 +111558,7 @@ CVE-2021-27025 (A flaw was discovered in Puppet Agent where the agent may silent
CVE-2021-27024 (A flaw was discovered in Continuous Delivery for Puppet Enterprise (CD ...)
NOT-FOR-US: Continuous Delivery for Puppet Enterprise
CVE-2021-27023 (A flaw was discovered in Puppet Agent and Puppet Server that may resul ...)
- - puppet <unfixed>
+ - puppet <removed>
[bullseye] - puppet <ignored> (Minor issue)
[buster] - puppet <ignored> (Minor issue)
[stretch] - puppet <ignored> (Minor issue)
@@ -190893,7 +190893,7 @@ CVE-2020-7943 (Puppet Server and PuppetDB provide useful performance and debuggi
NOTE: https://puppet.com/security/cve/CVE-2020-7943/
NOTE: https://github.com/puppetlabs/puppet_metrics_dashboard/pull/92
CVE-2020-7942 (Previously, Puppet operated on a model that a node with a valid certif ...)
- - puppet <unfixed> (unimportant)
+ - puppet <removed> (unimportant)
NOTE: This CVE assignment is for switching the default setting of strict_hostname_checking,
NOTE: the option is available in older Puppet releases (such as 4.8 from Stretch)
NOTE: https://puppet.com/security/cve/CVE-2020-7942/
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/876c51e785b9aa32c924471b928cddc3e270d961
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/876c51e785b9aa32c924471b928cddc3e270d961
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221004/d23a6d27/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list