summaryrefslogtreecommitdiffstats
path: root/data/CVE/2019.list
diff options
context:
space:
mode:
authorAdrian Bunk <bunk@debian.org>2021-02-06 22:10:08 +0200
committerAdrian Bunk <bunk@debian.org>2021-02-06 22:23:32 +0200
commitf66b14926ae3a57473b1802480bb9be3e5f90015 (patch)
tree8241a825af71157a3b5a072b1fd006e0dd6e433b /data/CVE/2019.list
parent7ce05b4c8b4d3768e7e94756eb82c1a50feffe49 (diff)
Reserve DLA-2547-1 for wireshark
Diffstat (limited to 'data/CVE/2019.list')
-rw-r--r--data/CVE/2019.list6
1 files changed, 3 insertions, 3 deletions
diff --git a/data/CVE/2019.list b/data/CVE/2019.list
index e811896ddb..4591951e6c 100644
--- a/data/CVE/2019.list
+++ b/data/CVE/2019.list
@@ -3689,7 +3689,7 @@ CVE-2019-19554
CVE-2019-19553 (In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector cou ...)
- wireshark 3.0.7-1 (low)
[buster] - wireshark 2.6.20-0+deb10u1
- [stretch] - wireshark <postponed> (Can be fixed along in next 2.6.x DSA)
+ [stretch] - wireshark 2.6.20-0+deb9u1
[jessie] - wireshark <postponed> (Can be fixed along in next 1.12.x DLA)
NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15961
NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=34d2e0d5318d0a7e9889498c721639e5cbf4ce45
@@ -11768,7 +11768,7 @@ CVE-2019-16277 (PicoC 2.1 has a heap-based buffer overflow in StringStrcpy in cs
CVE-2019-16319 (In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector ...)
- wireshark 3.0.4-1 (low)
[buster] - wireshark 2.6.20-0+deb10u1
- [stretch] - wireshark <postponed> (Can be fixed along in next 2.6.x DSA)
+ [stretch] - wireshark 2.6.20-0+deb9u1
[jessie] - wireshark <not-affected> (Vulnerable code not present)
NOTE: https://www.wireshark.org/security/wnpa-sec-2019-21.html
NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020
@@ -18974,7 +18974,7 @@ CVE-2019-13620
CVE-2019-13619 (In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ...)
- wireshark 2.6.10-1 (low)
[buster] - wireshark 2.6.20-0+deb10u1
- [stretch] - wireshark <postponed> (Can be fixed along in next 2.6.x release)
+ [stretch] - wireshark 2.6.20-0+deb9u1
[jessie] - wireshark <not-affected> (vulnerable code not present, binary encoding not yet supported)
NOTE: https://www.wireshark.org/security/wnpa-sec-2019-20.html
NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15870

© 2014-2024 Faster IT GmbH | imprint | privacy policy