[Git][security-tracker-team/security-tracker][master] Fix typo in note

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Apr 23 06:30:16 BST 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
2d3cb1cf by Salvatore Bonaccorso at 2026-04-23T07:29:50+02:00
Fix typo in note

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -910,7 +910,7 @@ CVE-2026-33257 (An attacker can send a web request that causes unlimited memory
 	NOTE: https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html#cve-2026-33257-insufficient-input-validation-of-internal-webserver
 	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33257-insufficient-input-validation-of-internal-web-server
 	NOTE: According to the advisory affects only PowerDNS Recursor up to and including 5.2.8,
-	NOTE: Mark the first version in unstable after 5.2.9 as the ixed version.
+	NOTE: Mark the first version in unstable after 5.2.9 as the fixed version.
 	NOTE: https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html#insufficient-input-validation-of-internal-webserver
 CVE-2026-33260 (An attacker can send a web request that causes unlimited memory alloca ...)
 	- dnsdist 2.0.4-1
@@ -923,7 +923,7 @@ CVE-2026-33260 (An attacker can send a web request that causes unlimited memory
 	NOTE: https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html#cve-2026-33260-insufficient-input-validation-of-internal-webserver
 	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33260-insufficient-input-validation-of-internal-web-server
 	NOTE: According to the advisory affects only PowerDNS Recursor up to and including 5.2.8,
-	NOTE: Mark the first version in unstable after 5.2.9 as the ixed version.
+	NOTE: Mark the first version in unstable after 5.2.9 as the fixed version.
 	NOTE: https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html
 CVE-2026-33593 (A client can trigger a divide by zero error leading to crash by sendin ...)
 	- dnsdist 2.0.4-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2d3cb1cffb2028a8c6c4a2bf5a5c75183bf71176

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2d3cb1cffb2028a8c6c4a2bf5a5c75183bf71176
You're receiving this email because of your account on salsa.debian.org. Manage all notifications: https://salsa.debian.org/-/profile/notifications | Help: https://salsa.debian.org/help


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260423/c7c5b7fa/attachment.htm>


More information about the debian-security-tracker-commits mailing list