[Git][security-tracker-team/security-tracker][master] golang-1.11: postpone open CVEs unfixed in bullseye
Sylvain Beucler (@beuc)
beuc at debian.org
Wed Apr 19 12:50:49 BST 2023
Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker
Commits:
cf04c43b by Sylvain Beucler at 2023-04-19T13:48:49+02:00
golang-1.11: postpone open CVEs unfixed in bullseye
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -18394,6 +18394,7 @@ CVE-2023-24538 (Templates do not properly consider backticks (`) as Javascript s
- golang-1.19 1.19.8-2
- golang-1.15 <removed>
- golang-1.11 <removed>
+ [buster] - golang-1.11 <postponed> (Limited support, follow bullseye DSAs/point-releases)
NOTE: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
NOTE: https://go.dev/issue/59234
NOTE: https://github.com/golang/go/commit/20374d1d759bc4e17486bde1cb9dca5be37d9e52 (go1.20.3)
@@ -18404,6 +18405,7 @@ CVE-2023-24537 (Calling any of the Parse functions on Go source code which conta
- golang-1.19 1.19.8-2
- golang-1.15 <removed>
- golang-1.11 <removed>
+ [buster] - golang-1.11 <postponed> (Limited support, follow bullseye DSAs/point-releases)
NOTE: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
NOTE: https://go.dev/issue/59180
NOTE: https://github.com/golang/go/commit/e7c4b07ecf6b367f1afc9cc48cde963829dd0aab (go1.20.3)
@@ -18415,6 +18417,7 @@ CVE-2023-24536 (Multipart form parsing can consume large amounts of CPU and memo
- golang-1.19 1.19.8-2
- golang-1.15 <removed>
- golang-1.11 <removed>
+ [buster] - golang-1.11 <postponed> (Limited support, follow bullseye DSAs/point-releases)
NOTE: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
NOTE: https://go.dev/issue/59153
NOTE: https://github.com/golang/go/commit/bf8c7c575c8a552d9d79deb29e80854dc88528d0 (go1.20.3)
@@ -18427,6 +18430,7 @@ CVE-2023-24534 (HTTP and MIME header parsing can allocate large amounts of memor
- golang-1.19 1.19.8-2
- golang-1.15 <removed>
- golang-1.11 <removed>
+ [buster] - golang-1.11 <postponed> (Limited support, follow bullseye DSAs/point-releases)
NOTE: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
NOTE: https://go.dev/issue/58975
NOTE: https://github.com/golang/go/commit/3991f6c41c7dfd167e889234c0cf1d840475e93c (go1.20.3)
@@ -18440,7 +18444,7 @@ CVE-2023-24532 (The ScalarMult and ScalarBaseMult methods of the P256 Curve may
- golang-1.15 <removed>
[bullseye] - golang-1.15 <no-dsa> (Minor issue)
- golang-1.11 <removed>
- [buster] - golang-1.11 <postponed> (Limited support, follow bullseye DSAs/point-releases)
+ [buster] - golang-1.11 <postponed> (Limited support, minor issue, follow bullseye DSAs/point-releases)
NOTE: https://golangtutorial.dev/news/go-1.20.2-and-go-1.19.7-versions-released/
NOTE: https://github.com/golang/go/issues/58647
NOTE: https://go-review.googlesource.com/c/go/+/471256
@@ -48484,6 +48488,7 @@ CVE-2022-41717 (An attacker can cause excessive memory growth in a Go server acc
- golang-1.18 1.18.9-1
- golang-1.15 <removed>
- golang-1.11 <removed>
+ [buster] - golang-1.11 <postponed> (Limited support, follow bullseye DSAs/point-releases)
- golang-golang-x-net 1:0.4.0+dfsg-1
- golang-golang-x-net-dev <removed>
NOTE: https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU
@@ -73306,7 +73311,7 @@ CVE-2022-1997 (Cross-site Scripting (XSS) - Stored in GitHub repository francois
CVE-2022-1996 (Authorization Bypass Through User-Controlled Key in GitHub repository ...)
- golang-github-emicklei-go-restful 3.10.2-1 (bug #1012763)
[bullseye] - golang-github-emicklei-go-restful <no-dsa> (Minor issue)
- [buster] - golang-github-emicklei-go-restful <postponed> (Limited support, follow bullseye DSAs/point-releases)
+ [buster] - golang-github-emicklei-go-restful <postponed> (Limited support, minor issue, follow bullseye DSAs/point-releases)
NOTE: https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1/
NOTE: https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10 (v3.8.0)
CVE-2022-1995 (The Malware Scanner WordPress plugin before 4.5.2 does not sanitise an ...)
@@ -89106,7 +89111,7 @@ CVE-2022-27192 (The Reporting module in Aseco Lietuva document management system
CVE-2022-27191 (The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1 ...)
- golang-go.crypto 1:0.0~git20220315.3147a52-1
[bullseye] - golang-go.crypto <no-dsa> (Minor issue)
- [buster] - golang-go.crypto <postponed> (Limited support, follow bullseye DSAs/point-releases)
+ [buster] - golang-go.crypto <postponed> (Limited support, minor issue, follow bullseye DSAs/point-releases)
NOTE: https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ
NOTE: https://github.com/golang/crypto/commit/1baeb1ce4c0b006eff0f294c47cb7617598dfb3d
CVE-2022-27190
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cf04c43bc06c46637980c741d70e1dee3b25e8aa
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cf04c43bc06c46637980c741d70e1dee3b25e8aa
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230419/a18f127f/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list