From 53105eb4e097fa1671260432af330e1f6289c63f Mon Sep 17 00:00:00 2001 From: Brian May Date: Tue, 1 Dec 2020 08:35:36 +1100 Subject: Update referenced PR for CVE-2020-26160 PR #286 is much cleaner then PR #426 and is what the unstable package used. --- data/CVE/list | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/data/CVE/list b/data/CVE/list index e8b876b9e8..cb38b1a12e 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -10444,7 +10444,7 @@ CVE-2020-26160 (jwt-go before 4.0.0-preview1 allows attackers to bypass intended - golang-github-dgrijalva-jwt-go 3.2.0-3 (bug #971556) NOTE: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515 NOTE: https://github.com/dgrijalva/jwt-go/issues/422 - NOTE: https://github.com/dgrijalva/jwt-go/pull/426 + NOTE: https://github.com/dgrijalva/jwt-go/pull/286 CVE-2020-26159 (In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expressi ...) {DLA-2431-1} - libonig (bug #972113) -- cgit v1.2.3