[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff jmm at debian.org
Tue Mar 24 08:02:02 GMT 2020



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
94d5d734 by Moritz Muehlenhoff at 2020-03-24T09:01:42+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -67955,37 +67955,37 @@ CVE-2019-5183 (An exploitable type confusion vulnerability exists in AMD ATIDXX6
 CVE-2019-5182 (An exploitable stack buffer overflow vulnerability vulnerability exist ...)
 	TODO: check
 CVE-2019-5181 (An exploitable stack buffer overflow vulnerability vulnerability exist ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5180 (An exploitable stack buffer overflow vulnerability vulnerability exist ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5179 (An exploitable stack buffer overflow vulnerability vulnerability exist ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5178 (An exploitable stack buffer overflow vulnerability vulnerability exist ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5177 (An exploitable stack buffer overflow vulnerability vulnerability exist ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5176 (An exploitable stack buffer overflow vulnerability vulnerability exist ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5175 (An exploitable command injection vulnerability exists in the iocheckd  ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5174 (An exploitable command injection vulnerability exists in the iocheckd  ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5173 (An exploitable command injection vulnerability exists in the iocheckd  ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5172 (An exploitable command injection vulnerability exists in the iocheckd  ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5171 (An exploitable command injection vulnerability exists in the iocheckd  ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5170 (An exploitable command injection vulnerability exists in the iocheckd  ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5169 (An exploitable command injection vulnerability exists in the iocheckd  ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5168 (An exploitable command injection vulnerability exists in the iocheckd  ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5167 (An exploitable command injection vulnerability exists in the iocheckd  ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5166 (An exploitable stack buffer overflow vulnerability exists in the ioche ...)
-	TODO: check
+	NOT-FOR-US: WAGO
 CVE-2019-5165 (An exploitable authentication bypass vulnerability exists in the hostn ...)
 	NOT-FOR-US: Moxa
 CVE-2019-5164 (An exploitable code execution vulnerability exists in the ss-manager b ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/94d5d734a0973f1259b8edcdd2caf0f7cffef0a4

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/94d5d734a0973f1259b8edcdd2caf0f7cffef0a4
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200324/63115e64/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list