[Secure-testing-commits] r608 - sarge-checks/CAN
Micah Anderson
micah@costa.debian.org
Tue, 22 Mar 2005 08:45:23 +0100
Author: micah
Date: 2005-03-22 08:45:20 +0100 (Tue, 22 Mar 2005)
New Revision: 608
Modified:
sarge-checks/CAN/list
Log:
Bug and notes for 2005-0210, 0209 and some others
Modified: sarge-checks/CAN/list
===================================================================
--- sarge-checks/CAN/list 2005-03-22 07:30:00 UTC (rev 607)
+++ sarge-checks/CAN/list 2005-03-22 07:45:20 UTC (rev 608)
@@ -2290,9 +2290,12 @@
{DSA-667-1}
CAN-2005-0210 (Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a ...)
NOTE: fixed in ubuntu kernels
- TODO: check with kernel team
+ NOTE: 2.6.11 is not affected, apparantly 2.6.10 is no longer relevant
+ - kernel-source-2.6.8 (unfixed; bug#300838)
+ - kernel-source-2.4.27 2.4.27-9
CAN-2005-0209 (Netfilter in Linux kernel 2.6.8.1 allows remote attackers to cause a ...)
- TODO: check
+ NOTE: <horms> all kernels seem to be clear with regards to 2005-0209
+ NOTE: <dilinger> http://oss.sgi.com/archives/netdev/2005-01/msg01072.html resolves this and it is in all our kernels
CAN-2005-0208 (The HTML parsing functions in Gaim before 1.1.4 allow remote attackers ...)
- gaim 1:1.1.4
CAN-2005-0207 (Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows ...)
@@ -2300,10 +2303,11 @@
NOTE: http://linux.bkbits.net:8080/linux-2.6/cset@41db2d65wbgJvuXTv4x9_quExW0vEA
NOTE: fixed in upstream 2.6.10, 2.6.9 is dead
- kernel-source-2.6.8 2.6.8-14
- - kernel-source-2.6.8 2.6.8-14
CAN-2005-0206 (The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 ...)
- tetex-bin (unfixed; bug #300182)
TODO: check other packages
+ NOTE: Also needs to be checked in pdftex (in tetex-bin) gpdf, kpdf/kdegraphics, cupsysnd and pdftohtml all have xpdf code
+ NOTE: found this: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=135393
CAN-2005-0205 (KPPP 2.1.2 in KDE 3.1.5 and earlier, when setuid root without certain ...)
{DSA-692-1}
- kppp 4:3.1.6
@@ -6748,7 +6752,7 @@
NOTE: affects multiple S/MIME implementations
NOTE: checked current mozilla, which contains safe NSS 3.9.1
- mozilla 2:1.7.3
- TODO: see if anything else in debian uses S/MIME and is vulnerable.
+ TODO: see if anything else in debian uses S/MIME and is vulnerable, mutt has S/MIME unknown if its vulnerable
CAN-2003-0563
NOTE: reserved
CAN-2003-0562 (Buffer overflow in the CGI2PERL.NLM PERL handler in Novell Netware 5.1 ...)