[Git][security-tracker-team/security-tracker][master] add commit reference to h2o

Moritz Muehlenhoff jmm at debian.org
Wed Aug 21 10:12:31 BST 2019



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f1379965 by Moritz Muehlenhoff at 2019-08-21T09:12:06Z
add commit reference to h2o

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -17814,6 +17814,7 @@ CVE-2019-9515 (Some HTTP/2 implementations are vulnerable to a settings flood, p
 	NOTE: https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
 	NOTE: https://raw.githubusercontent.com/apache/trafficserver/8.0.x/CHANGELOG-8.0.4
 	NOTE: https://github.com/h2o/h2o/issues/2090
+	NOTE: https://github.com/h2o/h2o/commit/743d6b6118c29b75d0b84ef7950a2721c32dfe3f
 CVE-2019-9514 (Some HTTP/2 implementations are vulnerable to a reset flood, potential ...)
 	{DSA-4503-1}
 	- golang-1.13 1.13~beta1-3 (bug #934955)
@@ -17835,6 +17836,7 @@ CVE-2019-9514 (Some HTTP/2 implementations are vulnerable to a reset flood, pote
 	NOTE: https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
 	NOTE: https://raw.githubusercontent.com/apache/trafficserver/8.0.x/CHANGELOG-8.0.4
 	NOTE: https://github.com/h2o/h2o/issues/2090
+	NOTE: https://github.com/h2o/h2o/commit/743d6b6118c29b75d0b84ef7950a2721c32dfe3f
 CVE-2019-9513 (Some HTTP/2 implementations are vulnerable to resource loops, potentia ...)
 	- nginx 1.14.2-3 (bug #935037)
 	[jessie] - nginx <not-affected> (HTTP2 support only exists since version 1.9.5)
@@ -17866,6 +17868,7 @@ CVE-2019-9512 (Some HTTP/2 implementations are vulnerable to ping floods, potent
 	NOTE: https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
 	NOTE: https://raw.githubusercontent.com/apache/trafficserver/8.0.x/CHANGELOG-8.0.4
 	NOTE: https://github.com/h2o/h2o/issues/2090
+	NOTE: https://github.com/h2o/h2o/commit/743d6b6118c29b75d0b84ef7950a2721c32dfe3f
 CVE-2019-9511 (Some HTTP/2 implementations are vulnerable to window size manipulation ...)
 	- nginx 1.14.2-3 (bug #935037)
 	[jessie] - nginx <not-affected> (HTTP2 support only exists since version 1.9.5)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f137996557a0813f345ec3d509e5e21113803ea3

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f137996557a0813f345ec3d509e5e21113803ea3
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190821/b45c752c/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list