[Secure-testing-commits] r319 - in sarge-checks: CAN DSA

Joey Hess joeyh@costa.debian.org
Wed, 26 Jan 2005 20:07:22 +0100


Author: joeyh
Date: 2005-01-26 20:07:19 +0100 (Wed, 26 Jan 2005)
New Revision: 319

Modified:
   sarge-checks/CAN/list
   sarge-checks/DSA/list
Log:
updates


Modified: sarge-checks/CAN/list
===================================================================
--- sarge-checks/CAN/list	2005-01-25 20:14:14 UTC (rev 318)
+++ sarge-checks/CAN/list	2005-01-26 19:07:19 UTC (rev 319)
@@ -49,6 +49,7 @@
 	NOTE: reserved
 CAN-2005-0108 (Apache mod_auth_radius 1.5.4 allows remote malicious RADIUS servers to ...)
 	- libapache-mod-auth-radius 1.5.7-6
+	- libpam-radius-auth 1.3.16-3
 CAN-2005-0107
 	NOTE: reserved
 CAN-2005-0106
@@ -303,6 +304,7 @@
 	NOTE: reserved
 CAN-2004-1340
 	NOTE: reserved
+	- libpam-radius-auth 1.3.16-1.1
 CAN-2005-0032
 	NOTE: reserved
 CAN-2005-0031

Modified: sarge-checks/DSA/list
===================================================================
--- sarge-checks/DSA/list	2005-01-25 20:14:14 UTC (rev 318)
+++ sarge-checks/DSA/list	2005-01-26 19:07:19 UTC (rev 319)
@@ -1,3 +1,11 @@
+[26 Jan 2005] DSA-640-1 kdebase - missing return value check
+	{CAN-2005-0078}
+	- kdebase 4:3.0.5
+	NOTE: fixed in testing at time of DSA
+[26 Jan 2005] DSA-659-1 libpam-radius-auth - information leak, integer underflow
+	{CAN-2004-1340 CAN-2005-0108}
+	- libpam-radius-auth 1.3.16-3
+	NOTE: 1/2 fixed in testing at time of DSA
 [25 Jan 2005] DSA-658-1 libdbi-perl - insecure temporary file
 	{CAN-2005-0077}
 	- libdbi-perl 1.46-6