diff options
author | Tobias Frost <tobi@debian.org> | 2024-03-10 18:58:45 +0100 |
---|---|---|
committer | Tobias Frost <tobi@debian.org> | 2024-03-10 18:58:45 +0100 |
commit | e494cd253be892f0ab8bd86e86074788f6b9cc01 (patch) | |
tree | 75d73ca369320a8b7c602e6c0c5855db8093da43 /data | |
parent | 2c79e5d0ef7bbd6375a027256d758712b443960b (diff) |
Reserve DLA-3757-1 for nss.
Diffstat (limited to 'data')
-rw-r--r-- | data/CVE/list | 1 | ||||
-rw-r--r-- | data/DLA/list | 3 | ||||
-rw-r--r-- | data/dla-needed.txt | 8 |
3 files changed, 5 insertions, 7 deletions
diff --git a/data/CVE/list b/data/CVE/list index f07d23c09e..e9b242e9ca 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -27496,7 +27496,6 @@ CVE-2023-5388 - nss 2:3.98-1 (bug #1056284) [bookworm] - nss <no-dsa> (Minor issue) [bullseye] - nss <no-dsa> (Minor issue) - [buster] - nss <no-dsa> (Minor issue) NOTE: https://people.redhat.com/~hkario/marvin/ NOTE: Vendor patch (Rocky Linux, not upstreamed): https://git.rockylinux.org/staging/rpms/nss/-/commit/1f7f7523b61a2ada2f461548c4160fbbf979c5dd NOTE: Fixed by: https://hg.mozilla.org/projects/nss/rev/196716d8377ab427e326f20bff2d026e90ac69e2 diff --git a/data/DLA/list b/data/DLA/list index 945cab14ef..f18c291fca 100644 --- a/data/DLA/list +++ b/data/DLA/list @@ -1,3 +1,6 @@ +[10 Mar 2024] DLA-3757-1 nss - security update + {CVE-2023-5388 CVE-2024-0743} + [buster] - nss 2:3.42.1-1+deb10u8 [10 Mar 2024] DLA-3756-1 wordpress - security update [buster] - wordpress 5.0.21+dfsg1-0+deb10u1 [09 Mar 2024] DLA-3755-1 tar - security update diff --git a/data/dla-needed.txt b/data/dla-needed.txt index 87699f290f..85df162933 100644 --- a/data/dla-needed.txt +++ b/data/dla-needed.txt @@ -166,12 +166,8 @@ nova -- nss (tobi) NOTE: 20240121: Added by Front-Desk (apo) - NOTE: 20240209: <tobi> There is currently no (public) patch for CVE-2023-5388 - RedHat seems to have one in privateā¦ (tobi) - NOTE: 20240209: Tried to backport patches for CVE-2023-6135, however it is unclear which bits are required or if the - NOTE: 20240209: fix would be to backport nss to utilize HACL*. The version in buster does not have the NIST ciphers - NOTE: 20240209: in the files touched by the upstream patch. TL;DR: I'm unsure if the prepared patches are fixing the vulnerabilty. - NOTE: 20240209: The backported patches are in the LTS repository, CVE-2023-6135*.patch </tobi> - NOTE: 20230227: Upstream suggests to wait until they have a patch for 3.90 (their LTS version) available and backport from there. + NOTE: 20240310: CVE-2023-6135: Upstream suggests to wait until they have a patch for 3.90 (their LTS version) available and backport from there. + NOTE: 20230310: see also: Message-ID: <Zd5GYmuVVIDU54Vv@isildor2.loewenhoehle.ip> -- nvidia-graphics-drivers NOTE: 20240303: Added by Front-Desk (apo) |