[Git][security-tracker-team/security-tracker][master] Remove some duplicate NOTE prefixes

Salvatore Bonaccorso carnil at debian.org
Sun Jun 10 20:51:03 BST 2018


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
3e86f377 by Salvatore Bonaccorso at 2018-06-10T21:50:42+02:00
Remove some duplicate NOTE prefixes

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -36331,7 +36331,7 @@ CVE-2017-16042 (Growl adds growl notification support to nodejs. Growl before 1.
 	NOTE: Issue: https://github.com/tj/node-growl/issues/60
 	NOTE: https://github.com/tj/node-growl/pull/61
 	NOTE: https://nodesecurity.io/advisories/146
-	NOTE: NOTE: nodejs not covered by security support
+	NOTE: nodejs not covered by security support
 CVE-2017-16041 (ikst versions before 1.1.2 download resources over HTTP, which leaves ...)
 	TODO: check
 CVE-2017-16040 (gfe-sass is a library for promises (CommonJS/Promises/A,B,D) gfe-sass ...)
@@ -62096,7 +62096,7 @@ CVE-2017-7674 (The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 
 	- tomcat7 7.0.72-3
 	[jessie] - tomcat7 <postponed> (Can be fixed along in a future update)
 	[wheezy] - tomcat7 <not-affected> (Vulnerable code not present)
-	NOTE: NOTE: Since 7.0.72-3, src:tomcat7 only builds the Servlet API
+	NOTE: Since 7.0.72-3, src:tomcat7 only builds the Servlet API
 	NOTE: Fixed by: http://svn.apache.org/r1795814 (8.5.x)
 	NOTE: Fixed by: http://svn.apache.org/r1795815 (8.0.x)
 	NOTE: Fixed by: http://svn.apache.org/r1795816 (7.0.x)
@@ -70564,7 +70564,7 @@ CVE-2016-10127 (PySAML2 allows remote attackers to conduct XML external entity (
 CVE-2016-10149 (XML External Entity (XXE) vulnerability in PySAML2 4.4.0 and earlier ...)
 	{DSA-3759-1}
 	- python-pysaml2 3.0.0-5 (bug #850716)
-	NOTE: NOTE: https://github.com/rohe/pysaml2/pull/379
+	NOTE: https://github.com/rohe/pysaml2/pull/379
 	NOTE: https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b
 CVE-2017-XXXX [multiple new security issues]
 	- w3m 0.5.3-34 (bug #850432)
@@ -86701,7 +86701,7 @@ CVE-2016-9137 (Use-after-free vulnerability in the CURLFile implementation in ..
 	[wheezy] - php5 <not-affected> (Vulnerable code not present in version 5.4.45)
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73147
 	NOTE: http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f
-	NOTE: NOTE: Fixed in 7.0.12, 5.6.27
+	NOTE: Fixed in 7.0.12, 5.6.27
 	NOTE: http://www.openwall.com/lists/oss-security/2016/10/18/1
 CVE-2016-8673 (Cross-site request forgery (CSRF) vulnerability in the integrated web ...)
 	NOT-FOR-US: Siemens SIMATIC CP



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/3e86f37782d79dc4a3f09b4fcd1eba533c09866e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/3e86f37782d79dc4a3f09b4fcd1eba533c09866e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180610/1530ab14/attachment.html>


More information about the debian-security-tracker-commits mailing list