diff options
author | Utkarsh Gupta <utkarsh@debian.org> | 2021-02-27 02:03:10 +0530 |
---|---|---|
committer | Utkarsh Gupta <utkarsh@debian.org> | 2021-02-27 02:03:10 +0530 |
commit | 69f6f28618f1d8515ea902a42a778d1bb4a1c014 (patch) | |
tree | 7c440e6ea89cbaaee7f86ebea6b71cbfebd78673 /data/CVE/2020.list | |
parent | cc1093cff44e3e3ecc300d6136e61172d892234a (diff) |
Mark CVE-2020-28599/openscad as no-dsa for stretch
Diffstat (limited to 'data/CVE/2020.list')
-rw-r--r-- | data/CVE/2020.list | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list index ab2378365f..1acc69c9e4 100644 --- a/data/CVE/2020.list +++ b/data/CVE/2020.list @@ -5238,6 +5238,7 @@ CVE-2020-28600 CVE-2020-28599 (A stack-based buffer overflow vulnerability exists in the import_stl.c ...) - openscad 2021.01-1 [buster] - openscad <no-dsa> (Minor issue) + [stretch] - openscad <no-dsa> (Minor issue) NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223 NOTE: https://github.com/openscad/openscad/commit/07ea60f82e94a155f4926f17fad8e8366bc74874 CVE-2020-28598 |