[Git][security-tracker-team/security-tracker][master] First round of verification for 9.9 point release
Salvatore Bonaccorso
carnil at debian.org
Fri Apr 26 20:52:50 BST 2019
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6a7078af by Salvatore Bonaccorso at 2019-04-26T19:51:10Z
First round of verification for 9.9 point release
Move proposed updates which are not ACCEPTED or neither uploaded down to
the list to have a visual separation for the check.
- - - - -
1 changed file:
- data/next-point-update.txt
Changes:
=====================================
data/next-point-update.txt
=====================================
@@ -1,29 +1,3 @@
-CVE-2017-12424
- [stretch] - shadow 1:4.4-4.1+deb9u1
-CVE-2015-9261 [busybox: pointer misuse unziping files]
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2016-2148
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2016-2147
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2011-5325
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2017-15873
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2017-16544
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2017-17840
- [stretch] - open-iscsi 2.0.874-3~deb9u2
-CVE-2017-9527
- [stretch] - mruby 1.2.0+20161228+git30d5424a-1+deb9u1
-CVE-2018-14779
- [stretch] - yubico-piv-tool 1.4.2-2+deb9u1
-CVE-2018-14780
- [stretch] - yubico-piv-tool 1.4.2-2+deb9u1
-CVE-2018-18718
- [stretch] - gthumb 3:3.4.4.1-5+deb9u1
-CVE-2018-16336
- [stretch] - exiv2 0.25-3.1+deb9u2
CVE-2014-10077
[stretch] - ruby-i18n 0.7.0-2+deb9u1
CVE-2018-9240
@@ -32,14 +6,10 @@ CVE-2018-1000035
[stretch] - unzip 6.0-21+deb9u1
CVE-2019-8331
[stretch] - twitter-bootstrap3 3.3.7+dfsg-2+deb9u2
-CVE-2019-6438
- [stretch] - slurm-llnl 16.05.9-1+deb9u3
CVE-2018-1000872
[stretch] - python-pykmip 0.5.0-4+deb9u1
CVE-2019-7443
[stretch] - kauth 5.28.0-2+deb9u1
-CVE-2019-7659
- [stretch] - gsoap 2.8.35-4+deb9u2
CVE-2018-20169
[stretch] - linux 4.9.161-1
CVE-2018-19824
@@ -90,10 +60,6 @@ CVE-2016-9842
[stretch] - rsync 3.1.2-1+deb9u2
CVE-2016-9841
[stretch] - rsync 3.1.2-1+deb9u2
-CVE-2019-8907
- [stretch] - file 1:5.30-1+deb9u3
-CVE-2019-8905
- [stretch] - file 1:5.30-1+deb9u3
CVE-2018-20349
[stretch] - r-cran-igraph 1.0.1-1+deb9u1
CVE-2018-5383
@@ -124,31 +90,6 @@ CVE-2018-7725
[stretch] - zziplib 0.13.62-3.2~deb9u1
CVE-2018-7726
[stretch] - zziplib 0.13.62-3.2~deb9u1
-CVE-2019-XXXX
- [stretch] - open-vm-tools 2:10.1.5-5055683-4+deb9u2
- NOTE: For #925959 (no CVE)
-CVE-2018-11806
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
-CVE-2018-12617
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
-CVE-2018-16872
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
-CVE-2018-17958
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
-CVE-2018-18849
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
-CVE-2018-18954
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
-CVE-2018-19364
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
-CVE-2018-19489
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
-CVE-2019-3812
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
-CVE-2019-6778
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
-CVE-2019-9824
- [stretch] - qemu 1:2.8+dfsg-6+deb9u6
CVE-2019-10269
[stretch] - bwa 0.7.15-2+deb9u1
CVE-2018-7752
@@ -193,3 +134,62 @@ CVE-2017-16129
[stretch] - node-superagent 0.20.0+dfsg-1+deb9u1
CVE-2019-11358
[stretch] - jquery 3.1.1-2+deb9u1
+CVE-2017-12424
+ [stretch] - shadow 1:4.4-4.1+deb9u1
+CVE-2015-9261 [busybox: pointer misuse unziping files]
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2016-2148
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2016-2147
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2011-5325
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2017-15873
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2017-16544
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2017-17840
+ [stretch] - open-iscsi 2.0.874-3~deb9u2
+CVE-2017-9527
+ [stretch] - mruby 1.2.0+20161228+git30d5424a-1+deb9u1
+CVE-2018-14779
+ [stretch] - yubico-piv-tool 1.4.2-2+deb9u1
+CVE-2018-14780
+ [stretch] - yubico-piv-tool 1.4.2-2+deb9u1
+CVE-2018-18718
+ [stretch] - gthumb 3:3.4.4.1-5+deb9u1
+CVE-2018-16336
+ [stretch] - exiv2 0.25-3.1+deb9u2
+CVE-2019-6438
+ [stretch] - slurm-llnl 16.05.9-1+deb9u3
+CVE-2019-7659
+ [stretch] - gsoap 2.8.35-4+deb9u2
+CVE-2019-XXXX
+ [stretch] - open-vm-tools 2:10.1.5-5055683-4+deb9u2
+ NOTE: For #925959 (no CVE)
+CVE-2018-11806
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2018-12617
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2018-16872
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2018-17958
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2018-18849
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2018-18954
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2018-19364
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2018-19489
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2019-3812
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2019-6778
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2019-9824
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u6
+CVE-2019-8907
+ [stretch] - file 1:5.30-1+deb9u3
+CVE-2019-8905
+ [stretch] - file 1:5.30-1+deb9u3
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6a7078af952b5f6628ef0acde8bc0dec18260824
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6a7078af952b5f6628ef0acde8bc0dec18260824
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190426/0e438af2/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list