[Git][security-tracker-team/security-tracker][master] Reference issue in upstream tracker for CVE-2023-51774/ruby-json-jwt

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Jan 1 20:40:53 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
bc805522 by Salvatore Bonaccorso at 2024-01-01T21:40:09+01:00
Reference issue in upstream tracker for CVE-2023-51774/ruby-json-jwt

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -773,6 +773,7 @@ CVE-2023-51775 (The jose4j component before 0.9.4 for Java allows attackers to c
 CVE-2023-51774 (The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allows bypa ...)
 	- ruby-json-jwt <unfixed>
 	NOTE: https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md
+	NOTE: https://github.com/nov/json-jwt/issues/113
 	TODO: check if reported upstream
 CVE-2023-51773 (BACnet Stack before 1.3.2 has a decode function APDU buffer over-read  ...)
 	NOT-FOR-US: BACnet Stack



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bc805522bc9fc7dbdabb80ac1a8443e124878c18

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bc805522bc9fc7dbdabb80ac1a8443e124878c18
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240101/712335d2/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list