Guilhem Moulin pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0c90cfd7 by Guilhem Moulin at 2022-11-25T13:31:49+01:00
Reserve DLA-3205-1 for inetutils

- - - - -


3 changed files:

- data/CVE/list
- data/DLA/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -21232,7 +21232,6 @@ CVE-2022-3019 (The forgot password token basically just 
makes us capable of taki
 CVE-2022-39028 (telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 
1.0.3, and ...)
        - inetutils 2:2.3-5
        [bullseye] - inetutils 2:2.0-1+deb11u1
-       [buster] - inetutils <no-dsa> (Minor issue)
        NOTE: 
https://lists.gnu.org/archive/html/bug-inetutils/2022-08/msg00002.html
        NOTE: 
https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html
 CVE-2022-38795
@@ -90559,7 +90558,6 @@ CVE-2021-40438 (A crafted request uri-path can cause 
mod_proxy to forward the re
 CVE-2021-40491 (The ftp client in GNU Inetutils before 2.2 does not validate 
addresses ...)
        - inetutils 2:2.2-1 (bug #993476)
        [bullseye] - inetutils 2:2.0-1+deb11u1
-       [buster] - inetutils <no-dsa> (Minor issue)
        [stretch] - inetutils <no-dsa> (Minor issue)
        NOTE: 
https://lists.gnu.org/archive/html/bug-inetutils/2021-06/msg00002.html
        NOTE: 
https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=58cb043b190fd04effdaea7c9403416b436e50dd
@@ -285063,7 +285061,6 @@ CVE-2019-0053 (Insufficient validation of environment 
variables in the telnet cl
        [buster] - socks4-server <ignored> (Minor issue)
        [stretch] - socks4-server <ignored> (Minor issue)
        - inetutils 2:1.9.4-11 (low; bug #945861)
-       [buster] - inetutils <ignored> (Minor issue)
        [stretch] - inetutils <ignored> (Minor issue)
        [jessie] - inetutils <no-dsa> (Minor issue)
        NOTE: 
https://www.freebsd.org/security/advisories/FreeBSD-SA-19:12.telnet.asc


=====================================
data/DLA/list
=====================================
@@ -1,3 +1,6 @@
+[25 Nov 2022] DLA-3205-1 inetutils - security update
+       {CVE-2019-0053 CVE-2020-8284 CVE-2021-40491 CVE-2022-39028}
+       [buster] - inetutils 2:1.9.4-7+deb10u2
 [24 Nov 2022] DLA-3204-1 vim - security update
        {CVE-2022-0318 CVE-2022-0392 CVE-2022-0629 CVE-2022-0696 CVE-2022-1619 
CVE-2022-1621 CVE-2022-1785 CVE-2022-1897 CVE-2022-1942 CVE-2022-2000 
CVE-2022-2129 CVE-2022-3235 CVE-2022-3256 CVE-2022-3352}
        [buster] - vim 2:8.1.0875-5+deb10u4


=====================================
data/dla-needed.txt
=====================================
@@ -92,10 +92,6 @@ imagemagick
   NOTE: 20220904: VCS: 
https://salsa.debian.org/lts-team/packages/imagemagick.git
   NOTE: 20220904: Should be synced with Stretch. (apo)
 --
-inetutils (guilhem)
-  NOTE: 20221112: Programming language: C.
-  NOTE: 20221112: Follow fixes from bullseye 11.5 (Beuc/front-desk)
---
 ini4j
   NOTE: 20221012: Programming language: Java.
   NOTE: 20221012: Require investigation (lamby)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0c90cfd74733d33b0d1593a13f1775a0a8598456

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0c90cfd74733d33b0d1593a13f1775a0a8598456
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to