[Git][security-tracker-team/security-tracker][master] mark epics as n/a for two yajl issues

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Oct 28 19:44:36 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
7bcc546d by Moritz Muehlenhoff at 2024-10-28T20:44:27+01:00
mark epics as n/a for two yajl issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -216097,8 +216097,7 @@ CVE-2022-24795 (yajl-ruby is a C binding to the YAJL JSON parsing and generation
 	- burp 3.1.4-2 (bug #1040146)
 	[bookworm] - burp <no-dsa> (Minor issue)
 	[bullseye] - burp <no-dsa> (Minor issue)
-	- epics-base <unfixed> (bug #1040159)
-	[bookworm] - epics-base <no-dsa> (Minor issue)
+	- epics-base <not-affected> (Forked parser not affected, #1040159)
 	- r-cran-jsonlite 1.8.8+dfsg-1 (bug #1040161)
 	[bookworm] - r-cran-jsonlite <no-dsa> (Minor issue)
 	[bullseye] - r-cran-jsonlite <no-dsa> (Minor issue)
@@ -216110,6 +216109,7 @@ CVE-2022-24795 (yajl-ruby is a C binding to the YAJL JSON parsing and generation
 	NOTE: https://github.com/brianmario/yajl-ruby/commit/e8de283a6d64f0902740fd09e858fc3d7d803161
 	NOTE: https://github.com/lloyd/yajl/issues/239
 	NOTE: burp fix: https://github.com/grke/burp/commit/5ce44cdf7018767b53a4c5466c62e4dc99d0bc93
+	NOTE: epics-base: https://github.com/epics-base/epics-base/issues/405
 CVE-2022-24794 (Express OpenID Connect is an Express JS middleware implementing sign o ...)
 	NOT-FOR-US: Express OpenID Connect
 CVE-2022-24793 (PJSIP is a free and open source multimedia communication library writt ...)
@@ -494374,8 +494374,7 @@ CVE-2017-16516 (In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is
 	- burp 3.1.4-2 (bug #1040146)
 	[bookworm] - burp <no-dsa> (Minor issue)
 	[bullseye] - burp <no-dsa> (Minor issue)
-	- epics-base <unfixed> (bug #1040159)
-	[bookworm] - epics-base <no-dsa> (Minor issue)
+	- epics-base <not-affected> (Forked parser not affected, #1040159)
 	- r-cran-jsonlite 1.8.8+dfsg-1 (bug #1040161)
 	[bookworm] - r-cran-jsonlite <no-dsa> (Minor issue)
 	[bullseye] - r-cran-jsonlite <no-dsa> (Minor issue)
@@ -494385,6 +494384,7 @@ CVE-2017-16516 (In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is
 	NOTE: https://github.com/brianmario/yajl-ruby/issues/176
 	NOTE: https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce
 	NOTE: burp fix: https://github.com/grke/burp/commit/5ce44cdf7018767b53a4c5466c62e4dc99d0bc93
+	NOTE: epics-base: https://github.com/epics-base/epics-base/issues/405
 CVE-2017-16515
 	RESERVED
 CVE-2017-16514 (Multiple persistent stored Cross-Site-Scripting (XSS) vulnerabilities  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7bcc546d245ab7966ee711a348af5605d0f11c6f

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7bcc546d245ab7966ee711a348af5605d0f11c6f
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241028/9b08ea0a/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list