Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e771af0d by Salvatore Bonaccorso at 2024-11-13T11:49:23+01:00
Remove todo item for CVE-2024-52533

As per rely from Simon McVittie:

        The security-tracker page says:
        > check if has impact on embedded copy in src:gobject-introspection

        The answer to that is: no, the embedded copy in 
src:gobject-introspection
        is only there to satisfy a particularly completionist interpretation
        of the requirement to include source code, and is not actually compiled
        or used.

Link: https://bugs.debian.org/1087419#5

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -771,7 +771,6 @@ CVE-2024-52533 (gio/gsocks4aproxy.c in GNOME GLib before 
2.82.1 has an off-by-on
        NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/3461
        NOTE: 
https://gitlab.gnome.org/GNOME/glib/-/commit/25833cefda24c60af913d6f2d532b5afd608b821
 (main)
        NOTE: 
https://gitlab.gnome.org/GNOME/glib/-/commit/ec0b708b981af77fef8e4bbb603cde4de4cd2e29
 (2.82.1)
-       TODO: check if has impact on embedded copy in src:gobject-introspection
 CVE-2024-52532 (GNOME libsoup before 3.6.1 has an infinite loop, and memory 
consumptio ...)
        - libsoup3 <unfixed> (bug #1087416)
        [bookworm] - libsoup3 <no-dsa> (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e771af0de0dae52e10d44f414873239ff9b2402e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e771af0de0dae52e10d44f414873239ff9b2402e
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to