[Git][security-tracker-team/security-tracker][master] 10 commits: Track removals from buster via 10.3

Salvatore Bonaccorso carnil at debian.org
Sat Feb 8 09:31:33 GMT 2020



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
adcf0c45 by Salvatore Bonaccorso at 2020-02-07T10:33:51+01:00
Track removals from buster via 10.3

- - - - -
dc0e3235 by Salvatore Bonaccorso at 2020-02-07T10:33:52+01:00
Track removals from stretch via 9.12

- - - - -
62c8c78d by Salvatore Bonaccorso at 2020-02-07T10:33:53+01:00
Merge fixes for CVEs for src:linux in buster

- - - - -
b4e536f2 by Salvatore Bonaccorso at 2020-02-07T10:33:54+01:00
Merge fixes for CVEs for src:linux in stretch

- - - - -
9e49b05e by Salvatore Bonaccorso at 2020-02-07T10:33:54+01:00
Resort pending updates and not yet processed ones for buster-pu

- - - - -
cb16edda by Salvatore Bonaccorso at 2020-02-07T10:40:39+01:00
Resort pending updates and not yet processed ones for stretch-pu

- - - - -
9a9aec60 by Salvatore Bonaccorso at 2020-02-08T08:50:16+01:00
Merge buster-pu fixes with ACCEPTED comment

- - - - -
b7dbc47d by Salvatore Bonaccorso at 2020-02-08T08:50:17+01:00
Bump proposed version for haproxy rebased on DSA 4577-1

- - - - -
79faeefa by Salvatore Bonaccorso at 2020-02-08T09:47:07+01:00
Merge stretch-pu fixes with ACCEPTED comment

- - - - -
7e227c58 by Salvatore Bonaccorso at 2020-02-08T09:31:23+00:00
Merge branch '2020-02-08-stretch-9.12-buster-10.3' into 'master'

Track perparations for 9.12 and 10.3 point release

See merge request security-tracker-team/security-tracker!51
- - - - -


3 changed files:

- data/CVE/list
- data/next-oldstable-point-update.txt
- data/next-point-update.txt


Changes:

=====================================
data/CVE/list
=====================================
The diff for this file was not included because it is too large.

=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -26,44 +26,6 @@ CVE-2019-14267
 	[stretch] - pdfresurrect 0.12-6+deb9u1
 CVE-2019-11187
 	[stretch] - gosa 2.7.4+reloaded2-13+deb9u2
-CVE-2019-13173
-	[stretch] - node-fstream 1.0.10-1+deb9u1
-CVE-2019-13241
-	[stretch] - flightcrew 0.7.2+dfsg-9+deb9u1
-CVE-2019-13032
-	[stretch] - flightcrew 0.7.2+dfsg-9+deb9u1
-CVE-2018-3719
-	[stretch] - node-mixin-deep 1.1.3-1+deb9u1
-CVE-2019-10746
-	[stretch] - node-mixin-deep 1.1.3-1+deb9u1
-CVE-2018-19756
-	[stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-19757
-	[stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-19759
-	[stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-19761
-	[stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-19762
-	[stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-19763
-	[stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2019-3573
-	[stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2019-3574
-	[stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-14072
-	[stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-14073
-	[stretch] - libsixel 1.5.2-2+deb9u1
-CVE-2018-21010
-	[stretch] - openjpeg2 2.1.2-1.1+deb9u4
-CVE-2018-20847
-	[stretch] - openjpeg2 2.1.2-1.1+deb9u4
-CVE-2016-9112
-	[stretch] - openjpeg2 2.1.2-1.1+deb9u4
-CVE-2019-14806
-	[stretch] - python-werkzeug 0.11.15+dfsg1-1+deb9u1
 CVE-2018-7260
 	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 CVE-2018-19968
@@ -78,223 +40,9 @@ CVE-2019-11768
 	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 CVE-2019-12616
 	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2019-19010
-	[stretch] - limnoria 2017.01.10-1+deb9u1
-CVE-2019-13566
-	[stretch] - ros-ros-comm 1.12.6-2+deb9u1
-CVE-2019-13465
-	[stretch] - ros-ros-comm 1.12.6-2+deb9u1
-CVE-2019-13445
-	[stretch] - ros-ros-comm 1.12.6-2+deb9u2
-CVE-2019-9656
-	[stretch] - libofx 1:0.9.10-2+deb9u2
-CVE-2019-18197
-	[stretch] - libxslt 1.1.29-2.1+deb9u2
-CVE-2019-19555
-	[stretch] - fig2dev 1:3.2.6a-2+deb9u3
-CVE-2019-15961
-	[stretch] - clamav 0.102.1+dfsg-0+deb9u1
-CVE-2019-19269
-	[stretch] - proftpd-dfsg 1.3.5b-4+deb9u3
-CVE-2019-12095
-	[stretch] - php-horde 5.2.13+debian0-1+deb9u1
-CVE-2019-15681
-	[stretch] - libvncserver 0.9.11+dfsg-1.3~deb9u2
-CVE-2017-12173
-	[stretch] - sssd 1.15.0-3+deb9u1
-CVE-2014-6053
-	[stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-8287
-	[stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2018-20021
-	[stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2018-20022
-	[stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2018-7225
-	[stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-15678
-	[stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-15679
-	[stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-15680
-	[stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-15681
-	[stretch] - tightvnc 1:1.3.9-9+deb9u1
-CVE-2019-2228
-	[stretch] - cups 2.2.1-8+deb9u5
 CVE-2019-20372
 	[stretch] - nginx 1.10.3-1+deb9u4
-CVE-2017-14062
-	[stretch] - libidn 1.33-1+deb9u1
 CVE-2016-10894
 	[stretch] - xtrlock 2.8+deb9u1
 CVE-2019-16275
 	[stretch] - wpa 2:2.4-1+deb9u5
-CVE-2018-13093
-	[stretch] - linux 4.9.210-1
-CVE-2018-13094
-	[stretch] - linux 4.9.210-1
-CVE-2018-20976
-	[stretch] - linux 4.9.210-1
-CVE-2018-21008
-	[stretch] - linux 4.9.210-1
-CVE-2019-0136
-	[stretch] - linux 4.9.210-1
-CVE-2019-10220
-	[stretch] - linux 4.9.210-1
-CVE-2019-14615
-	[stretch] - linux 4.9.210-1
-CVE-2019-14814
-	[stretch] - linux 4.9.210-1
-CVE-2019-14815
-	[stretch] - linux 4.9.210-1
-CVE-2019-14816
-	[stretch] - linux 4.9.210-1
-CVE-2019-14895
-	[stretch] - linux 4.9.210-1
-CVE-2019-14896
-	[stretch] - linux 4.9.210-1
-CVE-2019-14897
-	[stretch] - linux 4.9.210-1
-CVE-2019-14901
-	[stretch] - linux 4.9.210-1
-CVE-2019-15030
-	[stretch] - linux 4.9.210-1
-CVE-2019-15098
-	[stretch] - linux 4.9.210-1
-CVE-2019-15217
-	[stretch] - linux 4.9.210-1
-CVE-2019-15291
-	[stretch] - linux 4.9.210-1
-CVE-2019-15505
-	[stretch] - linux 4.9.210-1
-CVE-2019-15917
-	[stretch] - linux 4.9.210-1
-CVE-2019-16746
-	[stretch] - linux 4.9.210-1
-CVE-2019-17052
-	[stretch] - linux 4.9.210-1
-CVE-2019-17053
-	[stretch] - linux 4.9.210-1
-CVE-2019-17054
-	[stretch] - linux 4.9.210-1
-CVE-2019-17055
-	[stretch] - linux 4.9.210-1
-CVE-2019-17056
-	[stretch] - linux 4.9.210-1
-CVE-2019-17075
-	[stretch] - linux 4.9.210-1
-CVE-2019-17133
-	[stretch] - linux 4.9.210-1
-CVE-2019-17666
-	[stretch] - linux 4.9.210-1
-CVE-2019-18282
-	[stretch] - linux 4.9.210-1
-CVE-2019-18660
-	[stretch] - linux 4.9.210-1
-CVE-2019-18683
-	[stretch] - linux 4.9.210-1
-CVE-2019-18806
-	[stretch] - linux 4.9.210-1
-CVE-2019-18809
-	[stretch] - linux 4.9.210-1
-CVE-2019-19037
-	[stretch] - linux 4.9.210-1
-CVE-2019-19049
-	[stretch] - linux 4.9.210-1
-CVE-2019-19051
-	[stretch] - linux 4.9.210-1
-CVE-2019-19052
-	[stretch] - linux 4.9.210-1
-CVE-2019-19056
-	[stretch] - linux 4.9.210-1
-CVE-2019-19057
-	[stretch] - linux 4.9.210-1
-CVE-2019-19062
-	[stretch] - linux 4.9.210-1
-CVE-2019-19063
-	[stretch] - linux 4.9.210-1
-CVE-2019-19066
-	[stretch] - linux 4.9.210-1
-CVE-2019-19068
-	[stretch] - linux 4.9.210-1
-CVE-2019-19227
-	[stretch] - linux 4.9.210-1
-CVE-2019-19332
-	[stretch] - linux 4.9.210-1
-CVE-2019-19447
-	[stretch] - linux 4.9.210-1
-CVE-2019-19523
-	[stretch] - linux 4.9.210-1
-CVE-2019-19524
-	[stretch] - linux 4.9.210-1
-CVE-2019-19525
-	[stretch] - linux 4.9.210-1
-CVE-2019-19527
-	[stretch] - linux 4.9.210-1
-CVE-2019-19530
-	[stretch] - linux 4.9.210-1
-CVE-2019-19531
-	[stretch] - linux 4.9.210-1
-CVE-2019-19532
-	[stretch] - linux 4.9.210-1
-CVE-2019-19533
-	[stretch] - linux 4.9.210-1
-CVE-2019-19534
-	[stretch] - linux 4.9.210-1
-CVE-2019-19535
-	[stretch] - linux 4.9.210-1
-CVE-2019-19536
-	[stretch] - linux 4.9.210-1
-CVE-2019-19537
-	[stretch] - linux 4.9.210-1
-CVE-2019-19767
-	[stretch] - linux 4.9.210-1
-CVE-2019-19947
-	[stretch] - linux 4.9.210-1
-CVE-2019-19965
-	[stretch] - linux 4.9.210-1
-CVE-2019-20096
-	[stretch] - linux 4.9.210-1
-CVE-2019-2215
-	[stretch] - linux 4.9.210-1
-CVE-2019-12614
-	[stretch] - linux 4.9.210-1
-CVE-2020-0030
-	[stretch] - linux 4.9.210-1
-CVE-2019-15695
-	[stretch] - tigervnc 1.7.0+dfsg-7+deb9u1
-CVE-2019-15694
-	[stretch] - tigervnc 1.7.0+dfsg-7+deb9u1
-CVE-2019-15693
-	[stretch] - tigervnc 1.7.0+dfsg-7+deb9u1
-CVE-2019-15692
-	[stretch] - tigervnc 1.7.0+dfsg-7+deb9u1
-CVE-2019-15691
-	[stretch] - tigervnc 1.7.0+dfsg-7+deb9u1
-CVE-2018-7225
-	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-15127
-	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20019
-	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20020
-	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20021
-	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20022
-	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20023
-	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-20024
-	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2018-6307
-	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2019-15681
-	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
-CVE-2019-20387
-	[stretch] - libsolv 0.6.24-1+deb9u2
-CVE-2020-2574
-	[stretch] - mariadb-10.1 10.1.44-0+deb9u1
-CVE-2019-2974
-	[stretch] - mariadb-10.1 10.1.44-0+deb9u1


=====================================
data/next-point-update.txt
=====================================
@@ -1,59 +1,17 @@
+CVE-2019-19919
+	[buster] - node-handlebars 3:4.1.0-1+deb10u1
+CVE-2019-18277
+	[buster] - haproxy 1.8.19-1+deb10u2
 CVE-2019-14267
 	[buster] - pdfresurrect 0.15-2+deb10u1
 CVE-2019-1020014
 	[buster] - golang-github-docker-docker-credential-helpers 0.6.1-2+deb10u1
-CVE-2019-16091
-	[buster] - libmysofa 0.6~dfsg0-3+deb10u1
-CVE-2019-16092
-	[buster] - libmysofa 0.6~dfsg0-3+deb10u1
-CVE-2019-16093
-	[buster] - libmysofa 0.6~dfsg0-3+deb10u1
-CVE-2019-16094
-	[buster] - libmysofa 0.6~dfsg0-3+deb10u1
-CVE-2019-16095
-	[buster] - libmysofa 0.6~dfsg0-3+deb10u1
-CVE-2019-20063
-	[buster] - libmysofa 0.6~dfsg0-3+deb10u1
 CVE-2019-17134
 	[buster] - octavia 3.0.0-3+deb10u1
-CVE-2018-21010
-	[buster] - openjpeg2 2.3.0-2+deb10u1
-CVE-2018-20847
-	[buster] - openjpeg2 2.3.0-2+deb10u1
 CVE-2019-14433
 	[buster] - nova 2:18.1.0-6+deb10u1
-CVE-2019-19010
-	[buster] - limnoria 2019.02.23-1+deb10u1
-CVE-2019-13566
-	[buster] - ros-ros-comm 1.14.3+ds1-5+deb10u1
-CVE-2019-13465
-	[buster] - ros-ros-comm 1.14.3+ds1-5+deb10u1
-CVE-2019-13445
-	[buster] - ros-ros-comm 1.14.3+ds1-5+deb10u1
 CVE-2019-14857
 	[buster] - libapache2-mod-auth-openidc 2.3.10.2-1+deb10u1
-CVE-2019-19555
-	[buster] - fig2dev 1:3.2.7a-5+deb10u2
-CVE-2019-19746
-	[buster] - fig2dev 1:3.2.7a-5+deb10u3
-CVE-2019-19797
-	[buster] - fig2dev 1:3.2.7a-5+deb10u3
-CVE-2019-15961
-	[buster] - clamav 0.102.1+dfsg-0+deb10u1
-CVE-2019-19269
-	[buster] - proftpd-dfsg 1.3.6-4+deb10u3
-CVE-2019-19270
-	[buster] - proftpd-dfsg 1.3.6-4+deb10u3
-CVE-2019-12095
-	[buster] - php-horde 5.2.20+debian0-1+deb10u1
-CVE-2019-1010006
-	[buster] - atril 1.20.3-1+deb10u1
-CVE-2019-11459
-	[buster] - atril 1.20.3-1+deb10u1
-CVE-2019-15681
-	[buster] - libvncserver 0.9.11+dfsg-1.3+deb10u1
-CVE-2019-17177
-	[buster] - freerdp2 2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u1
 CVE-2019-3866
 	[buster] - python-oslo.utils 3.36.4+2019.11.15.git.c49a426b66-1+deb10u1
 	[buster] - python-mistral-lib 1.0.0-1+deb10u1
@@ -65,249 +23,15 @@ CVE-2019-16776
 	[buster] - npm 5.8.0+ds6-4+deb10u1
 CVE-2019-16777
 	[buster] - npm 5.8.0+ds6-4+deb10u1
-CVE-2019-10740
-	[buster] - roundcube 1.3.10+dfsg.1-1~deb10u1
-CVE-2018-1000071
-	[buster] - roundcube 1.3.10+dfsg.1-1~deb10u1
-CVE-2014-6053
-	[buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-8287
-	[buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2018-20021
-	[buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2018-20022
-	[buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2018-7225
-	[buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-15678
-	[buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-15679
-	[buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-15680
-	[buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-15681
-	[buster] - tightvnc 1:1.3.9-9deb10u1
-CVE-2019-19919
-	[buster] - node-handlebars 3:4.1.0-1+deb10u1
-CVE-2019-2228
-	[buster] - cups 2.2.10-6+deb10u2
-CVE-2019-9740
-	[buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-9947
-	[buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-9948
-	[buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-10160
-	[buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-16056
-	[buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-16935
-	[buster] - python3.7 3.7.3-2+deb10u1
-CVE-2019-5188
-	[buster] - e2fsprogs 1.44.5-1+deb10u3
 CVE-2019-20372
 	[buster] - nginx 1.14.2-2+deb10u2
 CVE-2016-10894
 	[buster] - xtrlock 2.8+deb10u1
-CVE-2019-20149
-	[buster] - node-kind-of 6.0.2+dfsg-1+deb10u1
-CVE-2019-5068
-	[buster] - mesa 18.3.6-2+deb10u1
 CVE-2019-19791
 	[buster] - lemonldap-ng 2.0.2+ds-7+deb10u3
-CVE-2019-19886
-	[buster] - modsecurity 3.0.3-1+deb10u1
 CVE-2020-5202
 	[buster] - apt-cacher-ng 3.2.1-1
-CVE-2019-15695
-	[buster] - tigervnc 1.9.0+dfsg-3+deb10u1
-CVE-2019-15694
-	[buster] - tigervnc 1.9.0+dfsg-3+deb10u1
-CVE-2019-15693
-	[buster] - tigervnc 1.9.0+dfsg-3+deb10u1
-CVE-2019-15692
-	[buster] - tigervnc 1.9.0+dfsg-3+deb10u1
-CVE-2019-15691
-	[buster] - tigervnc 1.9.0+dfsg-3+deb10u1
-CVE-2019-18277
-	[buster] - haproxy 1.8.19-1+deb10u1
-CVE-2019-13508
-	[buster] - freetds 1.00.104-1+deb10u1
-CVE-2019-18634
-	[buster] - sudo 1.8.27-1+deb10u2
-CVE-2019-20387
-	[buster] - libsolv 0.6.35-2+deb10u1
-CVE-2020-2574
-	[buster] - mariadb-10.3 1:10.3.22-0+deb10u1
-CVE-2019-2974
-	[buster] - mariadb-10.3 1:10.3.22-0+deb10u1
-CVE-2019-2938
-	[buster] - mariadb-10.3 1:10.3.22-0+deb10u1
 CVE-2020-8116
 	[buster] - node-dot-prop 4.1.1-1+deb10u1
 CVE-2019-16770
 	[buster] - puma 3.12.0-2+deb10u1
-CVE-2019-14814
-	[buster] - linux 4.19.87-1
-CVE-2019-14815
-	[buster] - linux 4.19.87-1
-CVE-2019-14816
-	[buster] - linux 4.19.87-1
-CVE-2019-15030
-	[buster] - linux 4.19.87-1
-CVE-2019-15031
-	[buster] - linux 4.19.87-1
-CVE-2019-15098
-	[buster] - linux 4.19.87-1
-CVE-2019-15099
-	[buster] - linux 4.19.87-1
-CVE-2019-15291
-	[buster] - linux 4.19.87-1
-CVE-2019-15504
-	[buster] - linux 4.19.87-1
-CVE-2019-15505
-	[buster] - linux 4.19.87-1
-CVE-2019-15918
-	[buster] - linux 4.19.87-1
-CVE-2019-16714
-	[buster] - linux 4.19.87-1
-CVE-2019-16746
-	[buster] - linux 4.19.87-1
-CVE-2019-17052
-	[buster] - linux 4.19.87-1
-CVE-2019-17053
-	[buster] - linux 4.19.87-1
-CVE-2019-17054
-	[buster] - linux 4.19.87-1
-CVE-2019-17055
-	[buster] - linux 4.19.87-1
-CVE-2019-17056
-	[buster] - linux 4.19.87-1
-CVE-2019-17075
-	[buster] - linux 4.19.87-1
-CVE-2019-17133
-	[buster] - linux 4.19.87-1
-CVE-2019-17666
-	[buster] - linux 4.19.87-1
-CVE-2019-18282
-	[buster] - linux 4.19.87-1
-CVE-2019-18660
-	[buster] - linux 4.19.87-1
-CVE-2019-18683
-	[buster] - linux 4.19.87-1
-CVE-2019-18806
-	[buster] - linux 4.19.87-1
-CVE-2019-18813
-	[buster] - linux 4.19.87-1
-CVE-2019-19045
-	[buster] - linux 4.19.87-1
-CVE-2019-19048
-	[buster] - linux 4.19.87-1
-CVE-2019-19049
-	[buster] - linux 4.19.87-1
-CVE-2019-19052
-	[buster] - linux 4.19.87-1
-CVE-2019-19065
-	[buster] - linux 4.19.87-1
-CVE-2019-19080
-	[buster] - linux 4.19.87-1
-CVE-2019-19081
-	[buster] - linux 4.19.87-1
-CVE-2019-19523
-	[buster] - linux 4.19.87-1
-CVE-2019-19524
-	[buster] - linux 4.19.87-1
-CVE-2019-19525
-	[buster] - linux 4.19.87-1
-CVE-2019-19526
-	[buster] - linux 4.19.87-1
-CVE-2019-19527
-	[buster] - linux 4.19.87-1
-CVE-2019-19528
-	[buster] - linux 4.19.87-1
-CVE-2019-19529
-	[buster] - linux 4.19.87-1
-CVE-2019-19530
-	[buster] - linux 4.19.87-1
-CVE-2019-19532
-	[buster] - linux 4.19.87-1
-CVE-2019-19533
-	[buster] - linux 4.19.87-1
-CVE-2019-19534
-	[buster] - linux 4.19.87-1
-CVE-2019-19537
-	[buster] - linux 4.19.87-1
-CVE-2019-19922
-	[buster] - linux 4.19.87-1
-CVE-2019-19060
-	[buster] - linux 4.19.87-1
-CVE-2019-19075
-	[buster] - linux 4.19.87-1
-CVE-2019-10220
-	[buster] - linux 4.19.98-1
-CVE-2019-14615
-	[buster] - linux 4.19.98-1
-CVE-2019-14895
-	[buster] - linux 4.19.98-1
-CVE-2019-14896
-	[buster] - linux 4.19.98-1
-CVE-2019-14897
-	[buster] - linux 4.19.98-1
-CVE-2019-14901
-	[buster] - linux 4.19.98-1
-CVE-2019-15217
-	[buster] - linux 4.19.98-1
-CVE-2019-18786
-	[buster] - linux 4.19.98-1
-CVE-2019-18809
-	[buster] - linux 4.19.98-1
-CVE-2019-19037
-	[buster] - linux 4.19.98-1
-CVE-2019-19051
-	[buster] - linux 4.19.98-1
-CVE-2019-19056
-	[buster] - linux 4.19.98-1
-CVE-2019-19057
-	[buster] - linux 4.19.98-1
-CVE-2019-19058
-	[buster] - linux 4.19.98-1
-CVE-2019-19059
-	[buster] - linux 4.19.98-1
-CVE-2019-19062
-	[buster] - linux 4.19.98-1
-CVE-2019-19063
-	[buster] - linux 4.19.98-1
-CVE-2019-19066
-	[buster] - linux 4.19.98-1
-CVE-2019-19068
-	[buster] - linux 4.19.98-1
-CVE-2019-19071
-	[buster] - linux 4.19.98-1
-CVE-2019-19077
-	[buster] - linux 4.19.98-1
-CVE-2019-19078
-	[buster] - linux 4.19.98-1
-CVE-2019-19079
-	[buster] - linux 4.19.98-1
-CVE-2019-19227
-	[buster] - linux 4.19.98-1
-CVE-2019-19252
-	[buster] - linux 4.19.98-1
-CVE-2019-19332
-	[buster] - linux 4.19.98-1
-CVE-2019-19447
-	[buster] - linux 4.19.98-1
-CVE-2019-19767
-	[buster] - linux 4.19.98-1
-CVE-2019-19927
-	[buster] - linux 4.19.98-1
-CVE-2019-19947
-	[buster] - linux 4.19.98-1
-CVE-2019-19965
-	[buster] - linux 4.19.98-1
-CVE-2019-20096
-	[buster] - linux 4.19.98-1
-CVE-2019-9445
-	[buster] - linux 4.19.98-1
-CVE-2019-12614
-	[buster] - linux 4.19.98-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/7018ad9d6498b9eeab8f532c51412e25b2523cae...7e227c580595fcc6b712126620c7d130cf9cfa4e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/7018ad9d6498b9eeab8f532c51412e25b2523cae...7e227c580595fcc6b712126620c7d130cf9cfa4e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200208/2e6806fb/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list