[Git][security-tracker-team/security-tracker][master] Fix typo in note
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Apr 23 06:30:16 BST 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
2d3cb1cf by Salvatore Bonaccorso at 2026-04-23T07:29:50+02:00
Fix typo in note
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -910,7 +910,7 @@ CVE-2026-33257 (An attacker can send a web request that causes unlimited memory
NOTE: https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html#cve-2026-33257-insufficient-input-validation-of-internal-webserver
NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33257-insufficient-input-validation-of-internal-web-server
NOTE: According to the advisory affects only PowerDNS Recursor up to and including 5.2.8,
- NOTE: Mark the first version in unstable after 5.2.9 as the ixed version.
+ NOTE: Mark the first version in unstable after 5.2.9 as the fixed version.
NOTE: https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html#insufficient-input-validation-of-internal-webserver
CVE-2026-33260 (An attacker can send a web request that causes unlimited memory alloca ...)
- dnsdist 2.0.4-1
@@ -923,7 +923,7 @@ CVE-2026-33260 (An attacker can send a web request that causes unlimited memory
NOTE: https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html#cve-2026-33260-insufficient-input-validation-of-internal-webserver
NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33260-insufficient-input-validation-of-internal-web-server
NOTE: According to the advisory affects only PowerDNS Recursor up to and including 5.2.8,
- NOTE: Mark the first version in unstable after 5.2.9 as the ixed version.
+ NOTE: Mark the first version in unstable after 5.2.9 as the fixed version.
NOTE: https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html
CVE-2026-33593 (A client can trigger a divide by zero error leading to crash by sendin ...)
- dnsdist 2.0.4-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2d3cb1cffb2028a8c6c4a2bf5a5c75183bf71176
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2d3cb1cffb2028a8c6c4a2bf5a5c75183bf71176
You're receiving this email because of your account on salsa.debian.org. Manage all notifications: https://salsa.debian.org/-/profile/notifications | Help: https://salsa.debian.org/help
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260423/c7c5b7fa/attachment.htm>
More information about the debian-security-tracker-commits
mailing list