Your message dated Tue, 23 Apr 2024 17:27:02 +0000
with message-id <e1rzjv4-00aelp...@fasolo.debian.org>
and subject line Bug#1069654: Removed package(s) from unstable
has caused the Debian Bug report #1051504,
regarding salt: CVE-2023-20897 CVE-2023-20898
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051504: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051504
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: salt
Version: 3004.1+dfsg-2.2
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for salt.

CVE-2023-20897[0]:
| Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion
| return. After receiving several bad packets on the request server
| equal to the number of worker threads, the master will become
| unresponsive to return requests until restarted.


CVE-2023-20898[1]:
| Git Providers can read from the wrong environment because they get
| the same cache directory base name in Salt masters prior to 3005.2
| or 3006.2. Anything that uses Git Providers with different
| environments can get garbage data or the wrong data, which can lead
| to wrongful data disclosure, wrongful executions, data corruption
| and/or crash.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-20897
    https://www.cve.org/CVERecord?id=CVE-2023-20897
[1] https://security-tracker.debian.org/tracker/CVE-2023-20898
    https://www.cve.org/CVERecord?id=CVE-2023-20898
[2] https://saltproject.io/security-announcements/2023-08-10-advisory/

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Version: 3004.1+dfsg-2.2+rm

Dear submitter,

as the package salt has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/1069654

The version of this package that was in Debian prior to this removal
can still be found using https://snapshot.debian.org/.

Please note that the changes have been done on the master archive and
will not propagate to any mirrors until the next dinstall run at the
earliest.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Scott Kitterman (the ftpmaster behind the curtain)

--- End Message ---

Reply via email to