[Git][security-tracker-team/security-tracker][master] Triage bind9 issues for buster

Emilio Pozuelo Monfort (@pochu) pochu at debian.org
Tue Jan 31 17:33:04 GMT 2023



Emilio Pozuelo Monfort pushed to branch master at Debian Security Tracker / security-tracker


Commits:
12b86abf by Emilio Pozuelo Monfort at 2023-01-31T18:32:38+01:00
Triage bind9 issues for buster

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -18030,6 +18030,7 @@ CVE-2022-3925 (The buddybadges WordPress plugin through 1.0.0 does not sanitise
 CVE-2022-3924 (This issue can affect BIND 9 resolvers with `stale-answer-enable yes;` ...)
 	{DSA-5329-1}
 	- bind9 1:9.18.11-1
+	[buster] - bind9 <not-affected> (Vulnerable code introduced later)
 	NOTE: https://kb.isc.org/docs/cve-2022-3924
 CVE-2022-3923 (The ActiveCampaign for WooCommerce WordPress plugin through 1.9.6 does ...)
 	NOT-FOR-US: WordPress plugin
@@ -22559,6 +22560,7 @@ CVE-2022-43959 (Insufficiently Protected Credentials in the AD/LDAP server setti
 CVE-2022-3736 (BIND 9 resolver can crash when stale cache and stale answers are enabl ...)
 	{DSA-5329-1}
 	- bind9 1:9.18.11-1
+	[buster] - bind9 <not-affected> (Vulnerable code introduced later)
 	NOTE: https://kb.isc.org/docs/cve-2022-3736
 CVE-2022-3735 (A vulnerability was found in seccome Ehoney. It has been rated as crit ...)
 	NOT-FOR-US: seccome Ehoney
@@ -36318,6 +36320,7 @@ CVE-2022-3095 (The implementation of backslash parsing in the Dart URI class for
 CVE-2022-3094 (Sending a flood of dynamic DNS updates may cause `named` to allocate l ...)
 	{DSA-5329-1}
 	- bind9 1:9.18.11-1
+	[buster] - bind9 <ignored> (Upstream considers this a minor issue before 9.16)
 	NOTE: https://kb.isc.org/docs/cve-2022-3094
 CVE-2022-39197 (An XSS (Cross Site Scripting) vulnerability was found in HelpSystems C ...)
 	NOT-FOR-US: Cobalt Strike


=====================================
data/dla-needed.txt
=====================================
@@ -26,11 +26,6 @@ asterisk (Lee Garrett)
   NOTE: 20221211: Programming language: C.
   NOTE: 20230111: VCS: https://salsa.debian.org/lts-team/packages/asterisk.git
 --
-bind9 (Emilio)
-  NOTE: 20230126: Programming language: C.
-  NOTE: 20230126: VCS: https://salsa.debian.org/lts-team/packages/bind9.git
-  NOTE: 20230126: Special attention: Package is used in many cases. Please be very carefull with fix and upload!.
---
 ceph
   NOTE: 20221031: Programming language: C++.
   NOTE: 20221031: To be checked further. Not clear whether the vulnerability can be exploited in a Debian system.



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/12b86abf2d091b7106d0abf2b622dfff7a3bad98

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/12b86abf2d091b7106d0abf2b622dfff7a3bad98
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230131/6fb6f394/attachment.htm>


More information about the debian-security-tracker-commits mailing list