Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c8a23ae5 by Moritz Muehlenhoff at 2020-04-07T14:31:47+02:00
py2.7 fixed
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -22969,14 +22969,19 @@ CVE-2020-2177
        RESERVED
 CVE-2020-2176
        RESERVED
+       NOT-FOR-US: Jenkins plugin
 CVE-2020-2175
        RESERVED
+       NOT-FOR-US: Jenkins plugin
 CVE-2020-2174
        RESERVED
+       NOT-FOR-US: Jenkins plugin
 CVE-2020-2173
        RESERVED
+       NOT-FOR-US: Jenkins plugin
 CVE-2020-2172
        RESERVED
+       NOT-FOR-US: Jenkins plugin
 CVE-2020-2171 (Jenkins RapidDeploy Plugin 4.2 and earlier does not configure 
its XML  ...)
        NOT-FOR-US: Jenkins plugin
 CVE-2020-2170 (Jenkins RapidDeploy Plugin 4.2 and earlier does not escape 
package nam ...)
@@ -29846,7 +29851,7 @@ CVE-2019-18348 (An issue was discovered in urllib2 in 
Python 2.x through 2.7.17
        - python3.7 <unfixed> (unimportant)
        - python3.5 <removed> (unimportant)
        - python3.4 <removed> (unimportant)
-       - python2.7 <unfixed> (unimportant)
+       - python2.7 2.7.18~rc1-1 (unimportant)
        NOTE: https://bugs.python.org/issue38576
        NOTE: Issue only exploitable if CVE-2016-10739 is unfixed in src:glibc. 
This is
        NOTE: not the case in all suites, but the issue is minor in general and 
would



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c8a23ae521b7bb79b80ddc6ed4b68a2e44cd9ffc

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c8a23ae521b7bb79b80ddc6ed4b68a2e44cd9ffc
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to