[Secure-testing-commits] r1200 - sarge-checks/CAN

Joey Hess joeyh@costa.debian.org
Sat, 04 Jun 2005 09:14:25 +0000


Author: joeyh
Date: 2005-06-04 09:14:21 +0000 (Sat, 04 Jun 2005)
New Revision: 1200

Modified:
   sarge-checks/CAN/list
Log:
automatic CAN database update

Modified: sarge-checks/CAN/list
===================================================================
--- sarge-checks/CAN/list	2005-06-03 23:09:30 UTC (rev 1199)
+++ sarge-checks/CAN/list	2005-06-04 09:14:21 UTC (rev 1200)
@@ -846,12 +846,16 @@
 CAN-2005-1524
 	NOTE: reserved
 CAN-2005-1523 [GNU Mailutils 0.6 imap4d Format String Vulnerability]
+	{DSA-732-1}
 	- mailutils 1:0.6.1-3
 CAN-2005-1522 [GNU Mailutils 0.6 imap4d FETCH Command Resource Consumption DoS Vulnerability]
+	{DSA-732-1}
 	- mailutils 1:0.6.1-3
 CAN-2005-1521 [GNU Mailutils 0.6 imap4d fetch_io Heap overflow Vulnerability]
+	{DSA-732-1}
 	- mailutils 1:0.6.1-3
 CAN-2005-1520 [GNU Mailutils 0.6 mail header_get_field_name() Buffer Overflow Vulnerability]
+	{DSA-732-1}
 	- mailutils 1:0.6.1-3
 CAN-2005-1519 (Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered ...)
 	- squid 2.5.9-9