diff options
author | Thorsten Alteholz <debian@alteholz.de> | 2023-07-03 00:02:44 +0200 |
---|---|---|
committer | Thorsten Alteholz <debian@alteholz.de> | 2023-07-03 00:07:42 +0200 |
commit | 430ae6821506cd4290eacaa2d66eb4b328c866e2 (patch) | |
tree | df4ed8b779a57993dc57fa1221892e3b2cac3967 | |
parent | fd0c9bcc7987906937b2cdd5d4e0630e50a2a387 (diff) |
mark CVE-2023-3354 as no-dsa for Buster
-rw-r--r-- | data/CVE/list | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/list b/data/CVE/list index be0586df17..976cb7626c 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -445,6 +445,7 @@ CVE-2023-3354 [VNC: improper I/O watch removal in TLS handshake can lead to remo - qemu <unfixed> [bookworm] - qemu <no-dsa> (Minor issue) [bullseye] - qemu <no-dsa> (Minor issue) + [buster] - qemu <no-dsa> (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2216478 TODO: check, no details in RHBZ#2216478 on upstream status CVE-2023-3432 (Server-Side Request Forgery (SSRF) in GitHub repository plantuml/plant ...) |