tests fixes and sprints work
This commit is contained in:
@@ -0,0 +1,38 @@
|
||||
{
|
||||
"advisoryId": "DSA-5587-1",
|
||||
"source": "debian-security-tracker",
|
||||
"package": "curl",
|
||||
"cves": ["CVE-2023-46218", "CVE-2023-46219"],
|
||||
"severity": "medium",
|
||||
"description": "Multiple vulnerabilities in curl including cookie injection and HSTS bypass.",
|
||||
"vulnerableVersions": ["7.88.1-10+deb12u4"],
|
||||
"fixedVersions": ["7.88.1-10+deb12u5"],
|
||||
"references": {
|
||||
"dsa": "https://www.debian.org/security/2023/dsa-5587",
|
||||
"cveDetails": [
|
||||
"https://security-tracker.debian.org/tracker/CVE-2023-46218",
|
||||
"https://security-tracker.debian.org/tracker/CVE-2023-46219"
|
||||
],
|
||||
"snapshotPre": "https://snapshot.debian.org/package/curl/7.88.1-10%2Bdeb12u4/",
|
||||
"snapshotPost": "https://snapshot.debian.org/package/curl/7.88.1-10%2Bdeb12u5/"
|
||||
},
|
||||
"license": {
|
||||
"spdx": "curl",
|
||||
"permissive": true,
|
||||
"redistributionAllowed": true
|
||||
},
|
||||
"artifacts": {
|
||||
"pre": {
|
||||
"binary": "curl_7.88.1-10+deb12u4_amd64.deb",
|
||||
"debug": "curl-dbgsym_7.88.1-10+deb12u4_amd64.deb",
|
||||
"source": "curl_7.88.1-10+deb12u4.dsc"
|
||||
},
|
||||
"post": {
|
||||
"binary": "curl_7.88.1-10+deb12u5_amd64.deb",
|
||||
"debug": "curl-dbgsym_7.88.1-10+deb12u5_amd64.deb",
|
||||
"source": "curl_7.88.1-10+deb12u5.dsc"
|
||||
}
|
||||
},
|
||||
"verificationStatus": "verified",
|
||||
"addedAt": "2026-01-21T00:00:00Z"
|
||||
}
|
||||
@@ -0,0 +1,42 @@
|
||||
{
|
||||
"advisoryId": "DSA-5085-1",
|
||||
"source": "debian-security-tracker",
|
||||
"package": "expat",
|
||||
"cves": ["CVE-2022-25235", "CVE-2022-25236", "CVE-2022-25313", "CVE-2022-25314", "CVE-2022-25315"],
|
||||
"severity": "critical",
|
||||
"description": "Multiple vulnerabilities in libexpat XML parser including integer overflow, stack exhaustion, and use-after-free.",
|
||||
"vulnerableVersions": ["2.4.1-3"],
|
||||
"fixedVersions": ["2.4.1-3+deb11u1"],
|
||||
"references": {
|
||||
"dsa": "https://www.debian.org/security/2022/dsa-5085",
|
||||
"cveDetails": [
|
||||
"https://security-tracker.debian.org/tracker/CVE-2022-25235",
|
||||
"https://security-tracker.debian.org/tracker/CVE-2022-25236",
|
||||
"https://security-tracker.debian.org/tracker/CVE-2022-25313",
|
||||
"https://security-tracker.debian.org/tracker/CVE-2022-25314",
|
||||
"https://security-tracker.debian.org/tracker/CVE-2022-25315"
|
||||
],
|
||||
"snapshotPre": "https://snapshot.debian.org/package/expat/2.4.1-3/",
|
||||
"snapshotPost": "https://snapshot.debian.org/package/expat/2.4.1-3%2Bdeb11u1/"
|
||||
},
|
||||
"license": {
|
||||
"spdx": "MIT",
|
||||
"permissive": true,
|
||||
"redistributionAllowed": true
|
||||
},
|
||||
"artifacts": {
|
||||
"pre": {
|
||||
"binary": "libexpat1_2.4.1-3_amd64.deb",
|
||||
"debug": "libexpat1-dbgsym_2.4.1-3_amd64.deb",
|
||||
"source": "expat_2.4.1-3.dsc"
|
||||
},
|
||||
"post": {
|
||||
"binary": "libexpat1_2.4.1-3+deb11u1_amd64.deb",
|
||||
"debug": "libexpat1-dbgsym_2.4.1-3+deb11u1_amd64.deb",
|
||||
"source": "expat_2.4.1-3+deb11u1.dsc"
|
||||
}
|
||||
},
|
||||
"verificationStatus": "verified",
|
||||
"addedAt": "2026-01-21T00:00:00Z",
|
||||
"notes": "Good multi-function test case - 5 CVEs in single advisory"
|
||||
}
|
||||
@@ -0,0 +1,35 @@
|
||||
{
|
||||
"advisoryId": "DSA-5218-1",
|
||||
"source": "debian-security-tracker",
|
||||
"package": "zlib1g",
|
||||
"cves": ["CVE-2022-37434"],
|
||||
"severity": "high",
|
||||
"description": "Evgeny Legerov reported a heap-based buffer over-read in zlib that can occur during the inflate process.",
|
||||
"vulnerableVersions": ["1:1.2.11.dfsg-2+deb11u1"],
|
||||
"fixedVersions": ["1:1.2.11.dfsg-2+deb11u2"],
|
||||
"references": {
|
||||
"dsa": "https://www.debian.org/security/2022/dsa-5218",
|
||||
"cveDetails": "https://security-tracker.debian.org/tracker/CVE-2022-37434",
|
||||
"snapshotPre": "https://snapshot.debian.org/package/zlib/1%3A1.2.11.dfsg-2%2Bdeb11u1/",
|
||||
"snapshotPost": "https://snapshot.debian.org/package/zlib/1%3A1.2.11.dfsg-2%2Bdeb11u2/"
|
||||
},
|
||||
"license": {
|
||||
"spdx": "Zlib",
|
||||
"permissive": true,
|
||||
"redistributionAllowed": true
|
||||
},
|
||||
"artifacts": {
|
||||
"pre": {
|
||||
"binary": "zlib1g_1.2.11.dfsg-2+deb11u1_amd64.deb",
|
||||
"debug": "zlib1g-dbgsym_1.2.11.dfsg-2+deb11u1_amd64.deb",
|
||||
"source": "zlib_1.2.11.dfsg-2+deb11u1.dsc"
|
||||
},
|
||||
"post": {
|
||||
"binary": "zlib1g_1.2.11.dfsg-2+deb11u2_amd64.deb",
|
||||
"debug": "zlib1g-dbgsym_1.2.11.dfsg-2+deb11u2_amd64.deb",
|
||||
"source": "zlib_1.2.11.dfsg-2+deb11u2.dsc"
|
||||
}
|
||||
},
|
||||
"verificationStatus": "verified",
|
||||
"addedAt": "2026-01-21T00:00:00Z"
|
||||
}
|
||||
Reference in New Issue
Block a user