Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
372d3914 by Moritz Muehlenhoff at 2022-12-22T13:35:38+01:00
curl fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -16251,14 +16251,14 @@ CVE-2022-43553 (A remote code execution vulnerability 
in EdgeRouters (Version 2.
        NOT-FOR-US: EdgeRouters
 CVE-2022-43552 [HTTP Proxy deny use-after-free]
        RESERVED
-       - curl <unfixed> (bug #1026830)
+       - curl 7.86.0-3 (bug #1026830)
        NOTE: https://curl.se/docs/CVE-2022-43552.html
        NOTE: Introduced by (telnet): 
https://github.com/curl/curl/commit/b7eeb6e67fca686f840eacd6b8394edb58b07482 
(curl-7_16_0)
        NOTE: Introduced by (smb): 
https://github.com/curl/curl/commit/aec2e865f06669b9cb5d26cc1148d70bc418b163 
(curl-7_40_0)
        NOTE: Fixed by: 
https://github.com/curl/curl/commit/4f20188ac644afe174be6005ef4f6ffba232b8b2 
(curl-7_87_0)
 CVE-2022-43551 [Another HSTS bypass via IDN]
        RESERVED
-       - curl <unfixed> (bug #1026829)
+       - curl 7.86.0-3 (bug #1026829)
        NOTE: https://curl.se/docs/CVE-2022-43551.html
        NOTE: Introduced by: 
https://github.com/curl/curl/commit/7385610d0c74c6a254fea5e4cd6e1d559d848c8c 
(curl-7_74_0)
        NOTE: Enabled by default since: 
https://github.com/curl/curl/commit/d71ff2b9db566b3f4b2eb29441c2df86715d4339 
(curl-7_77_0)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/372d3914250258ada44e893dfa58c8248457fdfe

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/372d3914250258ada44e893dfa58c8248457fdfe
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to