diff options
author | Adrian Bunk <bunk@debian.org> | 2021-02-06 22:10:08 +0200 |
---|---|---|
committer | Adrian Bunk <bunk@debian.org> | 2021-02-06 22:23:32 +0200 |
commit | f66b14926ae3a57473b1802480bb9be3e5f90015 (patch) | |
tree | 8241a825af71157a3b5a072b1fd006e0dd6e433b /data/CVE/2019.list | |
parent | 7ce05b4c8b4d3768e7e94756eb82c1a50feffe49 (diff) |
Reserve DLA-2547-1 for wireshark
Diffstat (limited to 'data/CVE/2019.list')
-rw-r--r-- | data/CVE/2019.list | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/data/CVE/2019.list b/data/CVE/2019.list index e811896ddb..4591951e6c 100644 --- a/data/CVE/2019.list +++ b/data/CVE/2019.list @@ -3689,7 +3689,7 @@ CVE-2019-19554 CVE-2019-19553 (In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector cou ...) - wireshark 3.0.7-1 (low) [buster] - wireshark 2.6.20-0+deb10u1 - [stretch] - wireshark <postponed> (Can be fixed along in next 2.6.x DSA) + [stretch] - wireshark 2.6.20-0+deb9u1 [jessie] - wireshark <postponed> (Can be fixed along in next 1.12.x DLA) NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15961 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=34d2e0d5318d0a7e9889498c721639e5cbf4ce45 @@ -11768,7 +11768,7 @@ CVE-2019-16277 (PicoC 2.1 has a heap-based buffer overflow in StringStrcpy in cs CVE-2019-16319 (In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector ...) - wireshark 3.0.4-1 (low) [buster] - wireshark 2.6.20-0+deb10u1 - [stretch] - wireshark <postponed> (Can be fixed along in next 2.6.x DSA) + [stretch] - wireshark 2.6.20-0+deb9u1 [jessie] - wireshark <not-affected> (Vulnerable code not present) NOTE: https://www.wireshark.org/security/wnpa-sec-2019-21.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020 @@ -18974,7 +18974,7 @@ CVE-2019-13620 CVE-2019-13619 (In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ...) - wireshark 2.6.10-1 (low) [buster] - wireshark 2.6.20-0+deb10u1 - [stretch] - wireshark <postponed> (Can be fixed along in next 2.6.x release) + [stretch] - wireshark 2.6.20-0+deb9u1 [jessie] - wireshark <not-affected> (vulnerable code not present, binary encoding not yet supported) NOTE: https://www.wireshark.org/security/wnpa-sec-2019-20.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15870 |