[Secure-testing-commits] r319 - in sarge-checks: CAN DSA
Joey Hess
joeyh@costa.debian.org
Wed, 26 Jan 2005 20:07:22 +0100
Author: joeyh
Date: 2005-01-26 20:07:19 +0100 (Wed, 26 Jan 2005)
New Revision: 319
Modified:
sarge-checks/CAN/list
sarge-checks/DSA/list
Log:
updates
Modified: sarge-checks/CAN/list
===================================================================
--- sarge-checks/CAN/list 2005-01-25 20:14:14 UTC (rev 318)
+++ sarge-checks/CAN/list 2005-01-26 19:07:19 UTC (rev 319)
@@ -49,6 +49,7 @@
NOTE: reserved
CAN-2005-0108 (Apache mod_auth_radius 1.5.4 allows remote malicious RADIUS servers to ...)
- libapache-mod-auth-radius 1.5.7-6
+ - libpam-radius-auth 1.3.16-3
CAN-2005-0107
NOTE: reserved
CAN-2005-0106
@@ -303,6 +304,7 @@
NOTE: reserved
CAN-2004-1340
NOTE: reserved
+ - libpam-radius-auth 1.3.16-1.1
CAN-2005-0032
NOTE: reserved
CAN-2005-0031
Modified: sarge-checks/DSA/list
===================================================================
--- sarge-checks/DSA/list 2005-01-25 20:14:14 UTC (rev 318)
+++ sarge-checks/DSA/list 2005-01-26 19:07:19 UTC (rev 319)
@@ -1,3 +1,11 @@
+[26 Jan 2005] DSA-640-1 kdebase - missing return value check
+ {CAN-2005-0078}
+ - kdebase 4:3.0.5
+ NOTE: fixed in testing at time of DSA
+[26 Jan 2005] DSA-659-1 libpam-radius-auth - information leak, integer underflow
+ {CAN-2004-1340 CAN-2005-0108}
+ - libpam-radius-auth 1.3.16-3
+ NOTE: 1/2 fixed in testing at time of DSA
[25 Jan 2005] DSA-658-1 libdbi-perl - insecure temporary file
{CAN-2005-0077}
- libdbi-perl 1.46-6