Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b6dbe65d by Salvatore Bonaccorso at 2020-09-26T20:54:10+02:00
Correct dojo version as released in 10.6 buster point release

Fixes: 981c289275e2 ("Track dojo issues fixed in 10.6")

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -49529,13 +49529,13 @@ CVE-2020-5260 (Affected versions of Git have a 
vulnerability whereby Git can be
 CVE-2020-5259 (In affected versions of dojox (NPM package), the jqMix method 
is vulne ...)
        {DLA-2139-1}
        - dojo 1.15.3+dfsg1-1 (bug #953587)
-       [buster] - dojo 1.15.0+dfsg1-1+deb10u2
+       [buster] - dojo 1.14.2+dfsg1-1+deb10u2
        NOTE: 
https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw
        NOTE: 
https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da
 CVE-2020-5258 (In affected versions of dojo (NPM package), the deepCopy method 
is vul ...)
        {DLA-2139-1}
        - dojo 1.15.3+dfsg1-1 (bug #953585)
-       [buster] - dojo 1.15.0+dfsg1-1+deb10u2
+       [buster] - dojo 1.14.2+dfsg1-1+deb10u2
        NOTE: 
https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2
        NOTE: 
https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d
 CVE-2020-5257 (In Administrate (rubygem) before version 0.13.0, when sorting 
by attri ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b6dbe65ddd2e7012fe29cee9cc6691771b76ed96

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b6dbe65ddd2e7012fe29cee9cc6691771b76ed96
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to