[Git][security-tracker-team/security-tracker][master] Track fixed version for curl via unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Mar 27 19:43:49 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
da56174b by Salvatore Bonaccorso at 2024-03-27T20:43:07+01:00
Track fixed version for curl via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -12,7 +12,7 @@ CVE-2024-26652 [net: pds_core: Fix possible double free in error handling path]
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ba18deddd6d502da71fd6b6143c53042271b82bd (6.8)
 CVE-2024-2004 [Usage of disabled protocol]
-	- curl <unfixed>
+	- curl 8.7.1-1
 	[bookworm] - curl <no-dsa> (Minor issue)
 	[bullseye] - curl <not-affected> (Vulnerable code not present)
 	[buster] - curl <not-affected> (Vulnerable code not present)
@@ -20,20 +20,20 @@ CVE-2024-2004 [Usage of disabled protocol]
 	NOTE: Introduced by: https://github.com/curl/curl/commit/e6f8445edef8e7996d1cfb141d6df184efef972c (curl-7_85_0)
 	NOTE: Fixed by: https://github.com/curl/curl/commit/17d302e56221f5040092db77d4f85086e8a20e0e (curl-8_7_0)
 CVE-2024-2379 [QUIC certificate check bypass with wolfSSL]
-	- curl <unfixed> (unimportant)
+	- curl 8.7.1-1 (unimportant)
 	NOTE: https://curl.se/docs/CVE-2024-2379.html
 	NOTE: Introduced by: https://github.com/curl/curl/commit/5d044ad9480a9f556f4b6a252d7533b1ba7fe57e (curl-8_6_0)
 	NOTE: Fixed by: https://github.com/curl/curl/commit/aedbbdf18e689a5eee8dc39600914f5eda6c409c (curl-8_7_0)
 	NOTE: curl in Debian not built with wolfSSL support
 CVE-2024-2398 [HTTP/2 push headers memory-leak]
-	- curl <unfixed>
+	- curl 8.7.1-1
 	[bookworm] - curl <no-dsa> (Minor issue)
 	[bullseye] - curl <no-dsa> (Minor issue)
 	NOTE: https://curl.se/docs/CVE-2024-2398.html
 	NOTE: Introduced by: https://github.com/curl/curl/commit/ea7134ac874a66107e54ff93657ac565cf2ec4aa (curl-7_44_0)
 	NOTE: Fixed by: https://github.com/curl/curl/commit/deca8039991886a559b67bcd6701db800a5cf764 (curl-8_7_0)
 CVE-2024-2466 [TLS certificate check bypass with mbedTLS]
-	- curl <unfixed> (unimportant)
+	- curl 8.7.1-1 (unimportant)
 	[bookworm] - curl <not-affected> (Vulnerable code not present)
 	[bullseye] - curl <not-affected> (Vulnerable code not present)
 	[buster] - curl <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/da56174ba2c87bb6e5e778b3a7d8669b2acc5ac3

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/da56174ba2c87bb6e5e778b3a7d8669b2acc5ac3
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240327/5bb04a2b/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list