[Git][security-tracker-team/security-tracker][master] 3 commits: lts: jython and python2.7 EOL on bullseye

Emilio Pozuelo Monfort (@pochu) pochu at debian.org
Fri Jan 23 13:13:22 GMT 2026



Emilio Pozuelo Monfort pushed to branch master at Debian Security Tracker / security-tracker


Commits:
722b5287 by Emilio Pozuelo Monfort at 2026-01-23T14:13:10+01:00
lts: jython and python2.7 EOL on bullseye

- - - - -
60be70b3 by Emilio Pozuelo Monfort at 2026-01-23T14:13:11+01:00
lts: postpone golang issues

They are either minor (DoS) or hard to trigger.

- - - - -
e2340263 by Emilio Pozuelo Monfort at 2026-01-23T14:13:12+01:00
lts: add modsecurity-crs

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -1541,6 +1541,7 @@ CVE-2026-0865 (User-controlled header names and values containing newlines can a
 	[bullseye] - python2.7 <end-of-life> (EOL in bullseye LTS)
 	- pypy3 <unfixed>
 	- jython <unfixed>
+	[bullseye] - jython <end-of-life> (EOL in bullseye LTS)
 	NOTE: https://github.com/python/cpython/pull/143917
 	NOTE: https://github.com/python/cpython/issues/143916
 	NOTE: https://mail.python.org/archives/list/security-announce@python.org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/
@@ -1593,7 +1594,9 @@ CVE-2025-15367 (The poplib module, when passed a user-controlled command, can ha
 	- python3.9 <removed>
 	- pypy3 <unfixed>
 	- python2.7 <removed>
+	[bullseye] - python2.7 <end-of-life> (EOL in bullseye LTS)
 	- jython <unfixed>
+	[bullseye] - jython <end-of-life> (EOL in bullseye LTS)
 	NOTE: https://github.com/python/cpython/issues/143923
 	NOTE: https://github.com/python/cpython/pull/143924
 	NOTE: https://mail.python.org/archives/list/security-announce@python.org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/
@@ -1605,7 +1608,9 @@ CVE-2025-15366 (The imaplib module, when passed a user-controlled command, can h
 	- python3.9 <removed>
 	- pypy3 <unfixed>
 	- python2.7 <removed>
+	[bullseye] - python2.7 <end-of-life> (EOL in bullseye LTS)
 	- jython <unfixed>
+	[bullseye] - jython <end-of-life> (EOL in bullseye LTS)
 	NOTE: https://github.com/python/cpython/issues/143921
 	NOTE: https://github.com/python/cpython/pull/143922
 	NOTE: https://mail.python.org/archives/list/security-announce@python.org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/
@@ -1617,7 +1622,9 @@ CVE-2025-15282 (User-controlled data URLs parsed by urllib.request.DataHandler a
 	- python3.9 <removed>
 	- pypy3 <unfixed>
 	- python2.7 <removed>
+	[bullseye] - python2.7 <end-of-life> (EOL in bullseye LTS)
 	- jython <unfixed>
+	[bullseye] - jython <end-of-life> (EOL in bullseye LTS)
 	NOTE: https://github.com/python/cpython/issues/143925
 	NOTE: https://github.com/python/cpython/pull/143926
 	NOTE: https://mail.python.org/archives/list/security-announce@python.org/thread/X66HL7SISGJT33J53OHXMZT4DFLMHVKF/
@@ -2914,6 +2921,7 @@ CVE-2025-61730 [crypto/tls: handshake messages may be processed at the incorrect
 	- golang-1.24 <unfixed> (bug #1125917)
 	- golang-1.19 <removed>
 	- golang-1.15 <removed>
+	[bullseye] - golang-1.15 <postponed> (Limited support, minor issue, follow bookworm DSAs/point-releases)
 	NOTE: https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc
 	NOTE: https://github.com/golang/go/issues/76443
 	NOTE: Fixed by: https://github.com/golang/go/commit/525dd853633f90d6038719d9a48cba3770ca71ea (go1.25.6)
@@ -2923,6 +2931,7 @@ CVE-2025-68119 [cmd/go: unexpected code execution when invoking toolchain]
 	- golang-1.24 <unfixed>
 	- golang-1.19 <removed>
 	- golang-1.15 <removed>
+	[bullseye] - golang-1.15 <postponed> (Limited support, minor issue, follow bookworm DSAs/point-releases)
 	NOTE: https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc
 	NOTE: https://github.com/golang/go/issues/77099
 	NOTE: Fixed by: https://github.com/golang/go/commit/082365aa552a7e2186f79110d5311dce70749cc0 (go1.25.6)
@@ -2932,6 +2941,7 @@ CVE-2025-61731 [cmd/go: bypass of flag sanitization can lead to arbitrary code e
 	- golang-1.24 <unfixed> (bug #1125917)
 	- golang-1.19 <removed>
 	- golang-1.15 <removed>
+	[bullseye] - golang-1.15 <postponed> (Limited support, minor issue, follow bookworm DSAs/point-releases)
 	NOTE: https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc
 	NOTE: https://github.com/golang/go/issues/77100
 	NOTE: Fixed by: https://github.com/golang/go/commit/2526187481ee31241b72f491992accbdd66c2655 (go1.25.6)
@@ -2943,6 +2953,7 @@ CVE-2025-68121 [crypto/tls: Config.Clone copies automatically generated session
 	- golang-1.19 <removed>
 	[bookworm] - golang-1.19 <no-dsa> (Minor issue)
 	- golang-1.15 <removed>
+	[bullseye] - golang-1.15 <postponed> (Limited support, minor issue, follow bookworm DSAs/point-releases)
 	NOTE: https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc
 	NOTE: https://github.com/golang/go/issues/77113
 	NOTE: Fixed by: https://github.com/golang/go/commit/4be38528a68a8b0c4e101576df200c214ad49c26 (go1.25.6)
@@ -2954,6 +2965,7 @@ CVE-2025-61726 [net/http: memory exhaustion in Request.ParseForm]
 	- golang-1.19 <removed>
 	[bookworm] - golang-1.19 <no-dsa> (Minor issue)
 	- golang-1.15 <removed>
+	[bullseye] - golang-1.15 <postponed> (Limited support, DoS, minor issue, follow bookworm DSAs/point-releases)
 	NOTE: https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc
 	NOTE: https://github.com/golang/go/issues/77101
 	NOTE: Fixed by: https://github.com/golang/go/commit/afa9b66ac081d3b239d8c1a226b5e884c8435185 (go1.25.6)
@@ -2963,6 +2975,7 @@ CVE-2025-61728 [archive/zip: denial of service when parsing arbitrary ZIP archiv
 	- golang-1.24 <unfixed> (bug #1125917)
 	- golang-1.19 <removed>
 	- golang-1.15 <removed>
+	[bullseye] - golang-1.15 <postponed> (Limited support, DoS, minor issue, follow bookworm DSAs/point-releases)
 	NOTE: https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc
 	NOTE: https://github.com/golang/go/issues/77102
 	NOTE: Fixed by: https://github.com/golang/go/commit/9d497df196d66553ae844c22a53fb86cd422e80c (go1.25.6)


=====================================
data/dla-needed.txt
=====================================
@@ -244,6 +244,9 @@ mimetex
   NOTE: 20250629: There doesn't seem to be a fix so far according to #1103801 (dleidert)
   NOTE: 20250629: Best course of action seems to be some kind of mitigation similar to https://moodle.org/mod/forum/discuss.php?d=467592 (dleidert)
 --
+modsecurity-crs
+  NOTE: 20260123: Added by Front-Desk (pochu)
+--
 nagvis
   NOTE: 20250117: Added by Front-Desk (rouca)
   NOTE: 20250119: Also check/fix https://bugs.debian.org/1061044



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/476d1889d46dcdbd322ceebd80e8618f433d4768...e23402636619f4b02c79516039470d7302a30225

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/476d1889d46dcdbd322ceebd80e8618f433d4768...e23402636619f4b02c79516039470d7302a30225
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260123/d73d342a/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list