summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBrian May <brian@linuxpenguins.xyz>2020-12-01 08:35:36 +1100
committerBrian May <brian@linuxpenguins.xyz>2020-12-01 08:38:26 +1100
commit53105eb4e097fa1671260432af330e1f6289c63f (patch)
treec605568816c1f38639d1a01d382bd5ae96522f93
parent7952a4904337b81e2a3ef3404f92d8d969d87c2c (diff)
Update referenced PR for CVE-2020-26160
PR #286 is much cleaner then PR #426 and is what the unstable package used.
-rw-r--r--data/CVE/list2
1 files changed, 1 insertions, 1 deletions
diff --git a/data/CVE/list b/data/CVE/list
index e8b876b9e8..cb38b1a12e 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -10444,7 +10444,7 @@ CVE-2020-26160 (jwt-go before 4.0.0-preview1 allows attackers to bypass intended
- golang-github-dgrijalva-jwt-go 3.2.0-3 (bug #971556)
NOTE: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515
NOTE: https://github.com/dgrijalva/jwt-go/issues/422
- NOTE: https://github.com/dgrijalva/jwt-go/pull/426
+ NOTE: https://github.com/dgrijalva/jwt-go/pull/286
CVE-2020-26159 (In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expressi ...)
{DLA-2431-1}
- libonig <unfixed> (bug #972113)

© 2014-2024 Faster IT GmbH | imprint | privacy policy