summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-08-02 20:42:35 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2020-08-02 20:43:18 +0200
commitcdb8a2c7102c7e107dc22f42d98c298a926f4855 (patch)
tree29256fb7524fef5e111ada82ca997a64d2deea86
parentff316551cff1c4da33e4ca239e433118172580b5 (diff)
Mark CVE-2020-14344/libx11 as no-dsa
Notably the original patchset causes regressions[1], reported upstream[2]. [1]: <https://bugs.debian.org/966691> [2]: <https://gitlab.freedesktop.org/xorg/lib/libx11/-/issues/116>
-rw-r--r--data/CVE/list1
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/list b/data/CVE/list
index 59d4e97..73bf3c9 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -4668,6 +4668,7 @@ CVE-2020-14345
CVE-2020-14344 [Heap corruption in the X input method client in libX11]
RESERVED
- libx11 2:1.6.10-1
+ [buster] - libx11 <no-dsa> (Minor issue)
NOTE: https://lists.x.org/archives/xorg-announce/2020-July/003050.html
NOTE: https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/0e6561efcfaa0ae7b5c74eac7e064b76d687544e
NOTE: https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/388b303c62aa35a245f1704211a023440ad2c488

© 2014-2020 Faster IT GmbH | imprint | privacy policy