[Secure-testing-commits] r1200 - sarge-checks/CAN
Joey Hess
joeyh@costa.debian.org
Sat, 04 Jun 2005 09:14:25 +0000
Author: joeyh
Date: 2005-06-04 09:14:21 +0000 (Sat, 04 Jun 2005)
New Revision: 1200
Modified:
sarge-checks/CAN/list
Log:
automatic CAN database update
Modified: sarge-checks/CAN/list
===================================================================
--- sarge-checks/CAN/list 2005-06-03 23:09:30 UTC (rev 1199)
+++ sarge-checks/CAN/list 2005-06-04 09:14:21 UTC (rev 1200)
@@ -846,12 +846,16 @@
CAN-2005-1524
NOTE: reserved
CAN-2005-1523 [GNU Mailutils 0.6 imap4d Format String Vulnerability]
+ {DSA-732-1}
- mailutils 1:0.6.1-3
CAN-2005-1522 [GNU Mailutils 0.6 imap4d FETCH Command Resource Consumption DoS Vulnerability]
+ {DSA-732-1}
- mailutils 1:0.6.1-3
CAN-2005-1521 [GNU Mailutils 0.6 imap4d fetch_io Heap overflow Vulnerability]
+ {DSA-732-1}
- mailutils 1:0.6.1-3
CAN-2005-1520 [GNU Mailutils 0.6 mail header_get_field_name() Buffer Overflow Vulnerability]
+ {DSA-732-1}
- mailutils 1:0.6.1-3
CAN-2005-1519 (Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered ...)
- squid 2.5.9-9