diff options
author | Brian May <brian@linuxpenguins.xyz> | 2020-12-01 08:35:36 +1100 |
---|---|---|
committer | Brian May <brian@linuxpenguins.xyz> | 2020-12-01 08:38:26 +1100 |
commit | 53105eb4e097fa1671260432af330e1f6289c63f (patch) | |
tree | c605568816c1f38639d1a01d382bd5ae96522f93 | |
parent | 7952a4904337b81e2a3ef3404f92d8d969d87c2c (diff) |
Update referenced PR for CVE-2020-26160
PR #286 is much cleaner then PR #426 and is what the unstable package
used.
-rw-r--r-- | data/CVE/list | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/data/CVE/list b/data/CVE/list index e8b876b9e8..cb38b1a12e 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -10444,7 +10444,7 @@ CVE-2020-26160 (jwt-go before 4.0.0-preview1 allows attackers to bypass intended - golang-github-dgrijalva-jwt-go 3.2.0-3 (bug #971556) NOTE: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515 NOTE: https://github.com/dgrijalva/jwt-go/issues/422 - NOTE: https://github.com/dgrijalva/jwt-go/pull/426 + NOTE: https://github.com/dgrijalva/jwt-go/pull/286 CVE-2020-26159 (In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expressi ...) {DLA-2431-1} - libonig <unfixed> (bug #972113) |