tests fixes and sprints work

This commit is contained in:
master
2026-01-22 19:08:46 +02:00
parent c32fff8f86
commit 726d70dc7f
881 changed files with 134434 additions and 6228 deletions

View File

@@ -0,0 +1,38 @@
{
"advisoryId": "DSA-5587-1",
"source": "debian-security-tracker",
"package": "curl",
"cves": ["CVE-2023-46218", "CVE-2023-46219"],
"severity": "medium",
"description": "Multiple vulnerabilities in curl including cookie injection and HSTS bypass.",
"vulnerableVersions": ["7.88.1-10+deb12u4"],
"fixedVersions": ["7.88.1-10+deb12u5"],
"references": {
"dsa": "https://www.debian.org/security/2023/dsa-5587",
"cveDetails": [
"https://security-tracker.debian.org/tracker/CVE-2023-46218",
"https://security-tracker.debian.org/tracker/CVE-2023-46219"
],
"snapshotPre": "https://snapshot.debian.org/package/curl/7.88.1-10%2Bdeb12u4/",
"snapshotPost": "https://snapshot.debian.org/package/curl/7.88.1-10%2Bdeb12u5/"
},
"license": {
"spdx": "curl",
"permissive": true,
"redistributionAllowed": true
},
"artifacts": {
"pre": {
"binary": "curl_7.88.1-10+deb12u4_amd64.deb",
"debug": "curl-dbgsym_7.88.1-10+deb12u4_amd64.deb",
"source": "curl_7.88.1-10+deb12u4.dsc"
},
"post": {
"binary": "curl_7.88.1-10+deb12u5_amd64.deb",
"debug": "curl-dbgsym_7.88.1-10+deb12u5_amd64.deb",
"source": "curl_7.88.1-10+deb12u5.dsc"
}
},
"verificationStatus": "verified",
"addedAt": "2026-01-21T00:00:00Z"
}

View File

@@ -0,0 +1,42 @@
{
"advisoryId": "DSA-5085-1",
"source": "debian-security-tracker",
"package": "expat",
"cves": ["CVE-2022-25235", "CVE-2022-25236", "CVE-2022-25313", "CVE-2022-25314", "CVE-2022-25315"],
"severity": "critical",
"description": "Multiple vulnerabilities in libexpat XML parser including integer overflow, stack exhaustion, and use-after-free.",
"vulnerableVersions": ["2.4.1-3"],
"fixedVersions": ["2.4.1-3+deb11u1"],
"references": {
"dsa": "https://www.debian.org/security/2022/dsa-5085",
"cveDetails": [
"https://security-tracker.debian.org/tracker/CVE-2022-25235",
"https://security-tracker.debian.org/tracker/CVE-2022-25236",
"https://security-tracker.debian.org/tracker/CVE-2022-25313",
"https://security-tracker.debian.org/tracker/CVE-2022-25314",
"https://security-tracker.debian.org/tracker/CVE-2022-25315"
],
"snapshotPre": "https://snapshot.debian.org/package/expat/2.4.1-3/",
"snapshotPost": "https://snapshot.debian.org/package/expat/2.4.1-3%2Bdeb11u1/"
},
"license": {
"spdx": "MIT",
"permissive": true,
"redistributionAllowed": true
},
"artifacts": {
"pre": {
"binary": "libexpat1_2.4.1-3_amd64.deb",
"debug": "libexpat1-dbgsym_2.4.1-3_amd64.deb",
"source": "expat_2.4.1-3.dsc"
},
"post": {
"binary": "libexpat1_2.4.1-3+deb11u1_amd64.deb",
"debug": "libexpat1-dbgsym_2.4.1-3+deb11u1_amd64.deb",
"source": "expat_2.4.1-3+deb11u1.dsc"
}
},
"verificationStatus": "verified",
"addedAt": "2026-01-21T00:00:00Z",
"notes": "Good multi-function test case - 5 CVEs in single advisory"
}

View File

@@ -0,0 +1,35 @@
{
"advisoryId": "DSA-5218-1",
"source": "debian-security-tracker",
"package": "zlib1g",
"cves": ["CVE-2022-37434"],
"severity": "high",
"description": "Evgeny Legerov reported a heap-based buffer over-read in zlib that can occur during the inflate process.",
"vulnerableVersions": ["1:1.2.11.dfsg-2+deb11u1"],
"fixedVersions": ["1:1.2.11.dfsg-2+deb11u2"],
"references": {
"dsa": "https://www.debian.org/security/2022/dsa-5218",
"cveDetails": "https://security-tracker.debian.org/tracker/CVE-2022-37434",
"snapshotPre": "https://snapshot.debian.org/package/zlib/1%3A1.2.11.dfsg-2%2Bdeb11u1/",
"snapshotPost": "https://snapshot.debian.org/package/zlib/1%3A1.2.11.dfsg-2%2Bdeb11u2/"
},
"license": {
"spdx": "Zlib",
"permissive": true,
"redistributionAllowed": true
},
"artifacts": {
"pre": {
"binary": "zlib1g_1.2.11.dfsg-2+deb11u1_amd64.deb",
"debug": "zlib1g-dbgsym_1.2.11.dfsg-2+deb11u1_amd64.deb",
"source": "zlib_1.2.11.dfsg-2+deb11u1.dsc"
},
"post": {
"binary": "zlib1g_1.2.11.dfsg-2+deb11u2_amd64.deb",
"debug": "zlib1g-dbgsym_1.2.11.dfsg-2+deb11u2_amd64.deb",
"source": "zlib_1.2.11.dfsg-2+deb11u2.dsc"
}
},
"verificationStatus": "verified",
"addedAt": "2026-01-21T00:00:00Z"
}