diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2021-11-25 21:23:06 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2021-11-25 21:23:06 +0100 |
commit | abe46135668c7f78227d3c0ddd862467b56381d5 (patch) | |
tree | e8957a52723512c9361cf21378ed159989a8f0d2 /data/CVE/list.2019 | |
parent | 1df74df1646cf2e359badb95ef9c758bfdbf7e2a (diff) |
Cleanup some additional whitespaces
Diffstat (limited to 'data/CVE/list.2019')
-rw-r--r-- | data/CVE/list.2019 | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/data/CVE/list.2019 b/data/CVE/list.2019 index 423fc9ffcf..0d164e4943 100644 --- a/data/CVE/list.2019 +++ b/data/CVE/list.2019 @@ -3826,7 +3826,7 @@ CVE-2019-19604 (Arbitrary command execution is possible in Git before 2.20.2, 2. NOTE: https://git.kernel.org/pub/scm/git/git.git/commit/?id=c1547450748fcbac21675f2681506d2d80351a19 NOTE: Upstream did backport fixes for CVE-2019-19604 to older versions as the introducing NOTE: version for sake of robustness/hardening. In particular, the server-side protection - NOTE: provided by the fsck is useful for protecting unpatched clients that are affected + NOTE: provided by the fsck is useful for protecting unpatched clients that are affected NOTE: by the bug. NOTE: https://gitlab.com/gitlab-com/gl-security/disclosures/blob/master/003_git_submodule/advisory.md NOTE: https://www.openwall.com/lists/oss-security/2019/12/13/1 @@ -22009,14 +22009,14 @@ CVE-2019-12615 (An issue was discovered in get_vdev_port_node_info in arch/sparc - linux 5.2.6-1 (unimportant) NOTE: https://git.kernel.org/linus/80caf43549e7e41a695c6d1e11066286538b336f NOTE: This is a potential null pointer dereference that looks like it can - NOTE: only be invoked by root or the hypervisor. Probably no security impact. + NOTE: only be invoked by root or the hypervisor. Probably no security impact. CVE-2019-12614 (An issue was discovered in dlpar_parse_cc_property in arch/powerpc/pla ...) - linux 5.3.7-1 (unimportant) [buster] - linux 4.19.98-1 [stretch] - linux 4.9.210-1 NOTE: https://lkml.org/lkml/2019/6/3/526 NOTE: This is a potential null pointer dereference that looks like it can - NOTE: only be invoked by root or the hypervisor. Probably no security impact. + NOTE: only be invoked by root or the hypervisor. Probably no security impact. CVE-2019-12601 (SuiteCRM 7.8.x before 7.8.30, 7.10.x before 7.10.17, and 7.11.x before ...) NOT-FOR-US: SuiteCRM CVE-2019-12600 (SuiteCRM 7.8.x before 7.8.30, 7.10.x before 7.10.17, and 7.11.x before ...) |