[Git][security-tracker-team/security-tracker][master] Remove some duplicate NOTE prefixes
Salvatore Bonaccorso
carnil at debian.org
Sun Jun 10 20:51:03 BST 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
3e86f377 by Salvatore Bonaccorso at 2018-06-10T21:50:42+02:00
Remove some duplicate NOTE prefixes
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -36331,7 +36331,7 @@ CVE-2017-16042 (Growl adds growl notification support to nodejs. Growl before 1.
NOTE: Issue: https://github.com/tj/node-growl/issues/60
NOTE: https://github.com/tj/node-growl/pull/61
NOTE: https://nodesecurity.io/advisories/146
- NOTE: NOTE: nodejs not covered by security support
+ NOTE: nodejs not covered by security support
CVE-2017-16041 (ikst versions before 1.1.2 download resources over HTTP, which leaves ...)
TODO: check
CVE-2017-16040 (gfe-sass is a library for promises (CommonJS/Promises/A,B,D) gfe-sass ...)
@@ -62096,7 +62096,7 @@ CVE-2017-7674 (The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to
- tomcat7 7.0.72-3
[jessie] - tomcat7 <postponed> (Can be fixed along in a future update)
[wheezy] - tomcat7 <not-affected> (Vulnerable code not present)
- NOTE: NOTE: Since 7.0.72-3, src:tomcat7 only builds the Servlet API
+ NOTE: Since 7.0.72-3, src:tomcat7 only builds the Servlet API
NOTE: Fixed by: http://svn.apache.org/r1795814 (8.5.x)
NOTE: Fixed by: http://svn.apache.org/r1795815 (8.0.x)
NOTE: Fixed by: http://svn.apache.org/r1795816 (7.0.x)
@@ -70564,7 +70564,7 @@ CVE-2016-10127 (PySAML2 allows remote attackers to conduct XML external entity (
CVE-2016-10149 (XML External Entity (XXE) vulnerability in PySAML2 4.4.0 and earlier ...)
{DSA-3759-1}
- python-pysaml2 3.0.0-5 (bug #850716)
- NOTE: NOTE: https://github.com/rohe/pysaml2/pull/379
+ NOTE: https://github.com/rohe/pysaml2/pull/379
NOTE: https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b
CVE-2017-XXXX [multiple new security issues]
- w3m 0.5.3-34 (bug #850432)
@@ -86701,7 +86701,7 @@ CVE-2016-9137 (Use-after-free vulnerability in the CURLFile implementation in ..
[wheezy] - php5 <not-affected> (Vulnerable code not present in version 5.4.45)
NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73147
NOTE: http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f
- NOTE: NOTE: Fixed in 7.0.12, 5.6.27
+ NOTE: Fixed in 7.0.12, 5.6.27
NOTE: http://www.openwall.com/lists/oss-security/2016/10/18/1
CVE-2016-8673 (Cross-site request forgery (CSRF) vulnerability in the integrated web ...)
NOT-FOR-US: Siemens SIMATIC CP
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/3e86f37782d79dc4a3f09b4fcd1eba533c09866e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/3e86f37782d79dc4a3f09b4fcd1eba533c09866e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180610/1530ab14/attachment.html>
More information about the debian-security-tracker-commits
mailing list