[Git][security-tracker-team/security-tracker][master] ATS fixed
Moritz Muehlenhoff
jmm at debian.org
Sat Aug 24 23:17:36 BST 2019
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f12cda23 by Moritz Muehlenhoff at 2019-08-24T22:16:56Z
ATS fixed
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -18449,7 +18449,7 @@ CVE-2019-9520
CVE-2019-9519
RESERVED
CVE-2019-9518 (Some HTTP/2 implementations are vulnerable to a flood of empty frames, ...)
- - trafficserver <unfixed> (bug #935314)
+ - trafficserver 8.0.5+ds-1 (bug #935314)
NOTE: https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
NOTE: https://github.com/apache/trafficserver/pull/5850
NOTE: https://github.com/apache/trafficserver/blob/8.0.x/CHANGELOG-8.0.5
@@ -18468,7 +18468,7 @@ CVE-2019-9516 (Some HTTP/2 implementations are vulnerable to a header leak, pote
NOTE: https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
CVE-2019-9515 (Some HTTP/2 implementations are vulnerable to a settings flood, potent ...)
{DSA-4508-1}
- - trafficserver <unfixed> (bug #934887)
+ - trafficserver 8.0.5+ds-1 (bug #934887)
- h2o 2.2.5+dfsg2-3 (bug #934886)
NOTE: https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
NOTE: https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
@@ -18487,7 +18487,7 @@ CVE-2019-9514 (Some HTTP/2 implementations are vulnerable to a reset flood, pote
- nodejs <unfixed> (bug #934885)
[stretch] - nodejs <not-affected> (No HTTP2 support yet)
[jessie] - nodejs <not-affected> (No HTTP2 support yet)
- - trafficserver <unfixed> (bug #934887)
+ - trafficserver 8.0.5+ds-1 (bug #934887)
- h2o 2.2.5+dfsg2-3 (bug #934886)
NOTE: Issue: https://github.com/golang/go/issues/33606
NOTE: https://github.com/golang/go/commit/e152b01a468a1c18a290bf9aec52ccea7693c7f2 (golang-1.11)
@@ -18520,7 +18520,7 @@ CVE-2019-9512 (Some HTTP/2 implementations are vulnerable to ping floods, potent
- golang-1.7 <removed>
- golang <removed>
- golang-golang-x-net-dev 1:0.0+git20190811.74dc4d7+dfsg-1
- - trafficserver <unfixed> (bug #934887)
+ - trafficserver 8.0.5+ds-1 (bug #934887)
- h2o 2.2.5+dfsg2-3 (bug #934886)
NOTE: Issue: https://github.com/golang/go/issues/33606
NOTE: https://github.com/golang/go/commit/e152b01a468a1c18a290bf9aec52ccea7693c7f2 (golang-1.11)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f12cda2311934344460b8545ce623d3c16162dd6
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f12cda2311934344460b8545ce623d3c16162dd6
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190824/9c11f39b/attachment.html>
More information about the debian-security-tracker-commits
mailing list