[Git][security-tracker-team/security-tracker][master] Reference issue in upstream tracker for CVE-2023-51774/ruby-json-jwt
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Jan 1 20:40:53 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
bc805522 by Salvatore Bonaccorso at 2024-01-01T21:40:09+01:00
Reference issue in upstream tracker for CVE-2023-51774/ruby-json-jwt
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -773,6 +773,7 @@ CVE-2023-51775 (The jose4j component before 0.9.4 for Java allows attackers to c
CVE-2023-51774 (The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allows bypa ...)
- ruby-json-jwt <unfixed>
NOTE: https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md
+ NOTE: https://github.com/nov/json-jwt/issues/113
TODO: check if reported upstream
CVE-2023-51773 (BACnet Stack before 1.3.2 has a decode function APDU buffer over-read ...)
NOT-FOR-US: BACnet Stack
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bc805522bc9fc7dbdabb80ac1a8443e124878c18
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bc805522bc9fc7dbdabb80ac1a8443e124878c18
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240101/712335d2/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list