summaryrefslogtreecommitdiffstats
path: root/data/CVE/2015.list
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2020-02-27 16:48:33 +0100
committerMoritz Muehlenhoff <jmm@debian.org>2020-02-27 16:48:33 +0100
commit0e6f786c5f0a973ad6cf28c8afa29ec64a80f37e (patch)
tree5db5076d2c24d6ddf8ef9fa98b7a77e954483d67 /data/CVE/2015.list
parenteae03a42d67c19aac3d303870a8ac765c8dc5ca3 (diff)
qtbase-opensource-src fixed
Diffstat (limited to 'data/CVE/2015.list')
-rw-r--r--data/CVE/2015.list2
1 files changed, 1 insertions, 1 deletions
diff --git a/data/CVE/2015.list b/data/CVE/2015.list
index ab8755dfa7..7f3844031c 100644
--- a/data/CVE/2015.list
+++ b/data/CVE/2015.list
@@ -12,7 +12,7 @@ CVE-2015-9542 (add_password in pam_radius_auth.c in pam_radius 1.4.0 does not co
NOTE: https://github.com/FreeRADIUS/pam_radius/commit/ac2c1677
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1686980
CVE-2015-9541 (Qt through 5.14 allows an exponential XML entity expansion attack via ...)
- - qtbase-opensource-src <unfixed> (low; bug #951066)
+ - qtbase-opensource-src 5.12.5+dfsg-9 (low; bug #951066)
[buster] - qtbase-opensource-src <no-dsa> (Minor issue)
[stretch] - qtbase-opensource-src <no-dsa> (Minor issue)
NOTE: https://bugreports.qt.io/browse/QTBUG-47417

© 2014-2024 Faster IT GmbH | imprint | privacy policy