[Git][security-tracker-team/security-tracker][master] 10 commits: Track removals from buster via 10.3
Salvatore Bonaccorso
carnil at debian.org
Sat Feb 8 09:31:33 GMT 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
adcf0c45 by Salvatore Bonaccorso at 2020-02-07T10:33:51+01:00
Track removals from buster via 10.3
- - - - -
dc0e3235 by Salvatore Bonaccorso at 2020-02-07T10:33:52+01:00
Track removals from stretch via 9.12
- - - - -
62c8c78d by Salvatore Bonaccorso at 2020-02-07T10:33:53+01:00
Merge fixes for CVEs for src:linux in buster
- - - - -
b4e536f2 by Salvatore Bonaccorso at 2020-02-07T10:33:54+01:00
Merge fixes for CVEs for src:linux in stretch
- - - - -
9e49b05e by Salvatore Bonaccorso at 2020-02-07T10:33:54+01:00
Resort pending updates and not yet processed ones for buster-pu
- - - - -
cb16edda by Salvatore Bonaccorso at 2020-02-07T10:40:39+01:00
Resort pending updates and not yet processed ones for stretch-pu
- - - - -
9a9aec60 by Salvatore Bonaccorso at 2020-02-08T08:50:16+01:00
Merge buster-pu fixes with ACCEPTED comment
- - - - -
b7dbc47d by Salvatore Bonaccorso at 2020-02-08T08:50:17+01:00
Bump proposed version for haproxy rebased on DSA 4577-1
- - - - -
79faeefa by Salvatore Bonaccorso at 2020-02-08T09:47:07+01:00
Merge stretch-pu fixes with ACCEPTED comment
- - - - -
7e227c58 by Salvatore Bonaccorso at 2020-02-08T09:31:23+00:00
Merge branch '2020-02-08-stretch-9.12-buster-10.3' into 'master'
Track perparations for 9.12 and 10.3 point release
See merge request security-tracker-team/security-tracker!51
- - - - -
3 changed files:
- data/CVE/list
- data/next-oldstable-point-update.txt
- data/next-point-update.txt
Changes:
=====================================
data/CVE/list
=====================================
The diff for this file was not included because it is too large.
=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -26,44 +26,6 @@ CVE-2019-14267
[stretch] - pdfresurrect 0.12-6+deb9u1
CVE-2019-11187
[stretch] - gosa 2.7.4+reloaded2-13+deb9u2
-CVE-2019-13173
- [stretch] - node-fstream 1.0.10-1+deb9u1
-CVE-2019-13241
- [stretch] - flightcrew 0.7.2+dfsg-9+deb9u1
-CVE-2019-13032
- [stretch] - flightcrew 0.7.2+dfsg-9+deb9u1
-CVE-2018-3719
- [stretch] - node-mixin-deep 1.1.3-1+deb9u1
-CVE-2019-10746
- [stretch] - node-mixin-deep 1.1.3-1+deb9u1
-CVE-2018-19756
- [stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-19757
- [stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-19759
- [stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-19761
- [stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-19762
- [stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-19763
- [stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2019-3573
- [stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2019-3574
- [stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-14072
- [stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-14073
- [stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-21010
- [stretch] - openjpeg2 2.1.2-1.1+deb9u4
-CVE-2018-20847
- [stretch] - openjpeg2 2.1.2-1.1+deb9u4
-CVE-2016-9112
- [stretch] - openjpeg2 2.1.2-1.1+deb9u4
-CVE-2019-14806
- [stretch] - python-werkzeug 0.11.15+dfsg1-1+deb9u1
CVE-2018-7260
[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
CVE-2018-19968
@@ -78,223 +40,9 @@ CVE-2019-11768
[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
CVE-2019-12616
[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2019-19010
- [stretch] - limnoria 2017.01.10-1+deb9u1
-CVE-2019-13566
- [stretch] - ros-ros-comm 1.12.6-2+deb9u1
-CVE-2019-13465
- [stretch] - ros-ros-comm 1.12.6-2+deb9u1
-CVE-2019-13445
- [stretch] - ros-ros-comm 1.12.6-2+deb9u2
-CVE-2019-9656
- [stretch] - libofx 1:0.9.10-2+deb9u2
-CVE-2019-18197
- [stretch] - libxslt 1.1.29-2.1+deb9u2
-CVE-2019-19555
- [stretch] - fig2dev 1:3.2.6a-2+deb9u3
-CVE-2019-15961
- [stretch] - clamav 0.102.1+dfsg-0+deb9u1
-CVE-2019-19269
- [stretch] - proftpd-dfsg 1.3.5b-4+deb9u3
-CVE-2019-12095
- [stretch] - php-horde 5.2.13+debian0-1+deb9u1
-CVE-2019-15681
- [stretch] - libvncserver 0.9.11+dfsg-1.3~deb9u2
-CVE-2017-12173
- [stretch] - sssd 1.15.0-3+deb9u1
-CVE-2014-6053
- [stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-8287
- [stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2018-20021
- [stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2018-20022
- [stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2018-7225
- [stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-15678
- [stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-15679
- [stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-15680
- [stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-15681
- [stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-2228
- [stretch] - cups 2.2.1-8+deb9u5
CVE-2019-20372
[stretch] - nginx 1.10.3-1+deb9u4
-CVE-2017-14062
- [stretch] - libidn 1.33-1+deb9u1
CVE-2016-10894
[stretch] - xtrlock 2.8+deb9u1
CVE-2019-16275
[stretch] - wpa 2:2.4-1+deb9u5
-CVE-2018-13093
- [stretch] - linux 4.9.210-1
-CVE-2018-13094
- [stretch] - linux 4.9.210-1
-CVE-2018-20976
- [stretch] - linux 4.9.210-1
-CVE-2018-21008
- [stretch] - linux 4.9.210-1
-CVE-2019-0136
- [stretch] - linux 4.9.210-1
-CVE-2019-10220
- [stretch] - linux 4.9.210-1
-CVE-2019-14615
- [stretch] - linux 4.9.210-1
-CVE-2019-14814
- [stretch] - linux 4.9.210-1
-CVE-2019-14815
- [stretch] - linux 4.9.210-1
-CVE-2019-14816
- [stretch] - linux 4.9.210-1
-CVE-2019-14895
- [stretch] - linux 4.9.210-1
-CVE-2019-14896
- [stretch] - linux 4.9.210-1
-CVE-2019-14897
- [stretch] - linux 4.9.210-1
-CVE-2019-14901
- [stretch] - linux 4.9.210-1
-CVE-2019-15030
- [stretch] - linux 4.9.210-1
-CVE-2019-15098
- [stretch] - linux 4.9.210-1
-CVE-2019-15217
- [stretch] - linux 4.9.210-1
-CVE-2019-15291
- [stretch] - linux 4.9.210-1
-CVE-2019-15505
- [stretch] - linux 4.9.210-1
-CVE-2019-15917
- [stretch] - linux 4.9.210-1
-CVE-2019-16746
- [stretch] - linux 4.9.210-1
-CVE-2019-17052
- [stretch] - linux 4.9.210-1
-CVE-2019-17053
- [stretch] - linux 4.9.210-1
-CVE-2019-17054
- [stretch] - linux 4.9.210-1
-CVE-2019-17055
- [stretch] - linux 4.9.210-1
-CVE-2019-17056
- [stretch] - linux 4.9.210-1
-CVE-2019-17075
- [stretch] - linux 4.9.210-1
-CVE-2019-17133
- [stretch] - linux 4.9.210-1
-CVE-2019-17666
- [stretch] - linux 4.9.210-1
-CVE-2019-18282
- [stretch] - linux 4.9.210-1
-CVE-2019-18660
- [stretch] - linux 4.9.210-1
-CVE-2019-18683
- [stretch] - linux 4.9.210-1
-CVE-2019-18806
- [stretch] - linux 4.9.210-1
-CVE-2019-18809
- [stretch] - linux 4.9.210-1
-CVE-2019-19037
- [stretch] - linux 4.9.210-1
-CVE-2019-19049
- [stretch] - linux 4.9.210-1
-CVE-2019-19051
- [stretch] - linux 4.9.210-1
-CVE-2019-19052
- [stretch] - linux 4.9.210-1
-CVE-2019-19056
- [stretch] - linux 4.9.210-1
-CVE-2019-19057
- [stretch] - linux 4.9.210-1
-CVE-2019-19062
- [stretch] - linux 4.9.210-1
-CVE-2019-19063
- [stretch] - linux 4.9.210-1
-CVE-2019-19066
- [stretch] - linux 4.9.210-1
-CVE-2019-19068
- [stretch] - linux 4.9.210-1
-CVE-2019-19227
- [stretch] - linux 4.9.210-1
-CVE-2019-19332
- [stretch] - linux 4.9.210-1
-CVE-2019-19447
- [stretch] - linux 4.9.210-1
-CVE-2019-19523
- [stretch] - linux 4.9.210-1
-CVE-2019-19524
- [stretch] - linux 4.9.210-1
-CVE-2019-19525
- [stretch] - linux 4.9.210-1
-CVE-2019-19527
- [stretch] - linux 4.9.210-1
-CVE-2019-19530
- [stretch] - linux 4.9.210-1
-CVE-2019-19531
- [stretch] - linux 4.9.210-1
-CVE-2019-19532
- [stretch] - linux 4.9.210-1
-CVE-2019-19533
- [stretch] - linux 4.9.210-1
-CVE-2019-19534
- [stretch] - linux 4.9.210-1
-CVE-2019-19535
- [stretch] - linux 4.9.210-1
-CVE-2019-19536
- [stretch] - linux 4.9.210-1
-CVE-2019-19537
- [stretch] - linux 4.9.210-1
-CVE-2019-19767
- [stretch] - linux 4.9.210-1
-CVE-2019-19947
- [stretch] - linux 4.9.210-1
-CVE-2019-19965
- [stretch] - linux 4.9.210-1
-CVE-2019-20096
- [stretch] - linux 4.9.210-1
-CVE-2019-2215
- [stretch] - linux 4.9.210-1
-CVE-2019-12614
- [stretch] - linux 4.9.210-1
-CVE-2020-0030
- [stretch] - linux 4.9.210-1
-CVE-2019-15695
- [stretch] - tigervnc 1.7.0+dfsg-7+deb9u1
-CVE-2019-15694
- [stretch] - tigervnc 1.7.0+dfsg-7+deb9u1
-CVE-2019-15693
- [stretch] - tigervnc 1.7.0+dfsg-7+deb9u1
-CVE-2019-15692
- [stretch] - tigervnc 1.7.0+dfsg-7+deb9u1
-CVE-2019-15691
- [stretch] - tigervnc 1.7.0+dfsg-7+deb9u1
-CVE-2018-7225
- [stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-15127
- [stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20019
- [stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20020
- [stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20021
- [stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20022
- [stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20023
- [stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20024
- [stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-6307
- [stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2019-15681
- [stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2019-20387
- [stretch] - libsolv 0.6.24-1+deb9u2
-CVE-2020-2574
- [stretch] - mariadb-10.1 10.1.44-0+deb9u1
-CVE-2019-2974
- [stretch] - mariadb-10.1 10.1.44-0+deb9u1
=====================================
data/next-point-update.txt
=====================================
@@ -1,59 +1,17 @@
+CVE-2019-19919
+ [buster] - node-handlebars 3:4.1.0-1+deb10u1
+CVE-2019-18277
+ [buster] - haproxy 1.8.19-1+deb10u2
CVE-2019-14267
[buster] - pdfresurrect 0.15-2+deb10u1
CVE-2019-1020014
[buster] - golang-github-docker-docker-credential-helpers 0.6.1-2+deb10u1
-CVE-2019-16091
- [buster] - libmysofa 0.6~dfsg0-3+deb10u1
-CVE-2019-16092
- [buster] - libmysofa 0.6~dfsg0-3+deb10u1
-CVE-2019-16093
- [buster] - libmysofa 0.6~dfsg0-3+deb10u1
-CVE-2019-16094
- [buster] - libmysofa 0.6~dfsg0-3+deb10u1
-CVE-2019-16095
- [buster] - libmysofa 0.6~dfsg0-3+deb10u1
-CVE-2019-20063
- [buster] - libmysofa 0.6~dfsg0-3+deb10u1
CVE-2019-17134
[buster] - octavia 3.0.0-3+deb10u1
-CVE-2018-21010
- [buster] - openjpeg2 2.3.0-2+deb10u1
-CVE-2018-20847
- [buster] - openjpeg2 2.3.0-2+deb10u1
CVE-2019-14433
[buster] - nova 2:18.1.0-6+deb10u1
-CVE-2019-19010
- [buster] - limnoria 2019.02.23-1+deb10u1
-CVE-2019-13566
- [buster] - ros-ros-comm 1.14.3+ds1-5+deb10u1
-CVE-2019-13465
- [buster] - ros-ros-comm 1.14.3+ds1-5+deb10u1
-CVE-2019-13445
- [buster] - ros-ros-comm 1.14.3+ds1-5+deb10u1
CVE-2019-14857
[buster] - libapache2-mod-auth-openidc 2.3.10.2-1+deb10u1
-CVE-2019-19555
- [buster] - fig2dev 1:3.2.7a-5+deb10u2
-CVE-2019-19746
- [buster] - fig2dev 1:3.2.7a-5+deb10u3
-CVE-2019-19797
- [buster] - fig2dev 1:3.2.7a-5+deb10u3
-CVE-2019-15961
- [buster] - clamav 0.102.1+dfsg-0+deb10u1
-CVE-2019-19269
- [buster] - proftpd-dfsg 1.3.6-4+deb10u3
-CVE-2019-19270
- [buster] - proftpd-dfsg 1.3.6-4+deb10u3
-CVE-2019-12095
- [buster] - php-horde 5.2.20+debian0-1+deb10u1
-CVE-2019-1010006
- [buster] - atril 1.20.3-1+deb10u1
-CVE-2019-11459
- [buster] - atril 1.20.3-1+deb10u1
-CVE-2019-15681
- [buster] - libvncserver 0.9.11+dfsg-1.3+deb10u1
-CVE-2019-17177
- [buster] - freerdp2 2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u1
CVE-2019-3866
[buster] - python-oslo.utils 3.36.4+2019.11.15.git.c49a426b66-1+deb10u1
[buster] - python-mistral-lib 1.0.0-1+deb10u1
@@ -65,249 +23,15 @@ CVE-2019-16776
[buster] - npm 5.8.0+ds6-4+deb10u1
CVE-2019-16777
[buster] - npm 5.8.0+ds6-4+deb10u1
-CVE-2019-10740
- [buster] - roundcube 1.3.10+dfsg.1-1~deb10u1
-CVE-2018-1000071
- [buster] - roundcube 1.3.10+dfsg.1-1~deb10u1
-CVE-2014-6053
- [buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-8287
- [buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2018-20021
- [buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2018-20022
- [buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2018-7225
- [buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-15678
- [buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-15679
- [buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-15680
- [buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-15681
- [buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-19919
- [buster] - node-handlebars 3:4.1.0-1+deb10u1
-CVE-2019-2228
- [buster] - cups 2.2.10-6+deb10u2
-CVE-2019-9740
- [buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-9947
- [buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-9948
- [buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-10160
- [buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-16056
- [buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-16935
- [buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-5188
- [buster] - e2fsprogs 1.44.5-1+deb10u3
CVE-2019-20372
[buster] - nginx 1.14.2-2+deb10u2
CVE-2016-10894
[buster] - xtrlock 2.8+deb10u1
-CVE-2019-20149
- [buster] - node-kind-of 6.0.2+dfsg-1+deb10u1
-CVE-2019-5068
- [buster] - mesa 18.3.6-2+deb10u1
CVE-2019-19791
[buster] - lemonldap-ng 2.0.2+ds-7+deb10u3
-CVE-2019-19886
- [buster] - modsecurity 3.0.3-1+deb10u1
CVE-2020-5202
[buster] - apt-cacher-ng 3.2.1-1
-CVE-2019-15695
- [buster] - tigervnc 1.9.0+dfsg-3+deb10u1
-CVE-2019-15694
- [buster] - tigervnc 1.9.0+dfsg-3+deb10u1
-CVE-2019-15693
- [buster] - tigervnc 1.9.0+dfsg-3+deb10u1
-CVE-2019-15692
- [buster] - tigervnc 1.9.0+dfsg-3+deb10u1
-CVE-2019-15691
- [buster] - tigervnc 1.9.0+dfsg-3+deb10u1
-CVE-2019-18277
- [buster] - haproxy 1.8.19-1+deb10u1
-CVE-2019-13508
- [buster] - freetds 1.00.104-1+deb10u1
-CVE-2019-18634
- [buster] - sudo 1.8.27-1+deb10u2
-CVE-2019-20387
- [buster] - libsolv 0.6.35-2+deb10u1
-CVE-2020-2574
- [buster] - mariadb-10.3 1:10.3.22-0+deb10u1
-CVE-2019-2974
- [buster] - mariadb-10.3 1:10.3.22-0+deb10u1
-CVE-2019-2938
- [buster] - mariadb-10.3 1:10.3.22-0+deb10u1
CVE-2020-8116
[buster] - node-dot-prop 4.1.1-1+deb10u1
CVE-2019-16770
[buster] - puma 3.12.0-2+deb10u1
-CVE-2019-14814
- [buster] - linux 4.19.87-1
-CVE-2019-14815
- [buster] - linux 4.19.87-1
-CVE-2019-14816
- [buster] - linux 4.19.87-1
-CVE-2019-15030
- [buster] - linux 4.19.87-1
-CVE-2019-15031
- [buster] - linux 4.19.87-1
-CVE-2019-15098
- [buster] - linux 4.19.87-1
-CVE-2019-15099
- [buster] - linux 4.19.87-1
-CVE-2019-15291
- [buster] - linux 4.19.87-1
-CVE-2019-15504
- [buster] - linux 4.19.87-1
-CVE-2019-15505
- [buster] - linux 4.19.87-1
-CVE-2019-15918
- [buster] - linux 4.19.87-1
-CVE-2019-16714
- [buster] - linux 4.19.87-1
-CVE-2019-16746
- [buster] - linux 4.19.87-1
-CVE-2019-17052
- [buster] - linux 4.19.87-1
-CVE-2019-17053
- [buster] - linux 4.19.87-1
-CVE-2019-17054
- [buster] - linux 4.19.87-1
-CVE-2019-17055
- [buster] - linux 4.19.87-1
-CVE-2019-17056
- [buster] - linux 4.19.87-1
-CVE-2019-17075
- [buster] - linux 4.19.87-1
-CVE-2019-17133
- [buster] - linux 4.19.87-1
-CVE-2019-17666
- [buster] - linux 4.19.87-1
-CVE-2019-18282
- [buster] - linux 4.19.87-1
-CVE-2019-18660
- [buster] - linux 4.19.87-1
-CVE-2019-18683
- [buster] - linux 4.19.87-1
-CVE-2019-18806
- [buster] - linux 4.19.87-1
-CVE-2019-18813
- [buster] - linux 4.19.87-1
-CVE-2019-19045
- [buster] - linux 4.19.87-1
-CVE-2019-19048
- [buster] - linux 4.19.87-1
-CVE-2019-19049
- [buster] - linux 4.19.87-1
-CVE-2019-19052
- [buster] - linux 4.19.87-1
-CVE-2019-19065
- [buster] - linux 4.19.87-1
-CVE-2019-19080
- [buster] - linux 4.19.87-1
-CVE-2019-19081
- [buster] - linux 4.19.87-1
-CVE-2019-19523
- [buster] - linux 4.19.87-1
-CVE-2019-19524
- [buster] - linux 4.19.87-1
-CVE-2019-19525
- [buster] - linux 4.19.87-1
-CVE-2019-19526
- [buster] - linux 4.19.87-1
-CVE-2019-19527
- [buster] - linux 4.19.87-1
-CVE-2019-19528
- [buster] - linux 4.19.87-1
-CVE-2019-19529
- [buster] - linux 4.19.87-1
-CVE-2019-19530
- [buster] - linux 4.19.87-1
-CVE-2019-19532
- [buster] - linux 4.19.87-1
-CVE-2019-19533
- [buster] - linux 4.19.87-1
-CVE-2019-19534
- [buster] - linux 4.19.87-1
-CVE-2019-19537
- [buster] - linux 4.19.87-1
-CVE-2019-19922
- [buster] - linux 4.19.87-1
-CVE-2019-19060
- [buster] - linux 4.19.87-1
-CVE-2019-19075
- [buster] - linux 4.19.87-1
-CVE-2019-10220
- [buster] - linux 4.19.98-1
-CVE-2019-14615
- [buster] - linux 4.19.98-1
-CVE-2019-14895
- [buster] - linux 4.19.98-1
-CVE-2019-14896
- [buster] - linux 4.19.98-1
-CVE-2019-14897
- [buster] - linux 4.19.98-1
-CVE-2019-14901
- [buster] - linux 4.19.98-1
-CVE-2019-15217
- [buster] - linux 4.19.98-1
-CVE-2019-18786
- [buster] - linux 4.19.98-1
-CVE-2019-18809
- [buster] - linux 4.19.98-1
-CVE-2019-19037
- [buster] - linux 4.19.98-1
-CVE-2019-19051
- [buster] - linux 4.19.98-1
-CVE-2019-19056
- [buster] - linux 4.19.98-1
-CVE-2019-19057
- [buster] - linux 4.19.98-1
-CVE-2019-19058
- [buster] - linux 4.19.98-1
-CVE-2019-19059
- [buster] - linux 4.19.98-1
-CVE-2019-19062
- [buster] - linux 4.19.98-1
-CVE-2019-19063
- [buster] - linux 4.19.98-1
-CVE-2019-19066
- [buster] - linux 4.19.98-1
-CVE-2019-19068
- [buster] - linux 4.19.98-1
-CVE-2019-19071
- [buster] - linux 4.19.98-1
-CVE-2019-19077
- [buster] - linux 4.19.98-1
-CVE-2019-19078
- [buster] - linux 4.19.98-1
-CVE-2019-19079
- [buster] - linux 4.19.98-1
-CVE-2019-19227
- [buster] - linux 4.19.98-1
-CVE-2019-19252
- [buster] - linux 4.19.98-1
-CVE-2019-19332
- [buster] - linux 4.19.98-1
-CVE-2019-19447
- [buster] - linux 4.19.98-1
-CVE-2019-19767
- [buster] - linux 4.19.98-1
-CVE-2019-19927
- [buster] - linux 4.19.98-1
-CVE-2019-19947
- [buster] - linux 4.19.98-1
-CVE-2019-19965
- [buster] - linux 4.19.98-1
-CVE-2019-20096
- [buster] - linux 4.19.98-1
-CVE-2019-9445
- [buster] - linux 4.19.98-1
-CVE-2019-12614
- [buster] - linux 4.19.98-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/7018ad9d6498b9eeab8f532c51412e25b2523cae...7e227c580595fcc6b712126620c7d130cf9cfa4e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/7018ad9d6498b9eeab8f532c51412e25b2523cae...7e227c580595fcc6b712126620c7d130cf9cfa4e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200208/2e6806fb/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list