[Secure-testing-commits] r708 - in sarge-checks: CAN DSA
Joey Hess
joeyh@costa.debian.org
Thu, 31 Mar 2005 21:13:52 +0000
Author: joeyh
Date: 2005-03-31 21:13:48 +0000 (Thu, 31 Mar 2005)
New Revision: 708
Modified:
sarge-checks/CAN/list
sarge-checks/DSA/list
Log:
netkit-telnet-ssl nmu
Modified: sarge-checks/CAN/list
===================================================================
--- sarge-checks/CAN/list 2005-03-31 19:18:34 UTC (rev 707)
+++ sarge-checks/CAN/list 2005-03-31 21:13:48 UTC (rev 708)
@@ -1734,7 +1734,6 @@
- wpasupplicant 0.3.8-1
CAN-2005-0469 (Buffer overflow in the slc_add_reply function in various BSD-based ...)
{DSA-699-1 DSA-697-1}
- { DSA-697-1}
TODO: heimdal contains a BSD derived telnet client as well, check whether it's vulnerable
TODO: krb4 contains a BSD derived telnet client as well, check whether it's vulnerable
TODO: krb5 contains a BSD derived telnet client as well, check whether it's vulnerable
Modified: sarge-checks/DSA/list
===================================================================
--- sarge-checks/DSA/list 2005-03-31 19:18:34 UTC (rev 707)
+++ sarge-checks/DSA/list 2005-03-31 21:13:48 UTC (rev 708)
@@ -7,7 +7,7 @@
NOTE: not fixed in testing at time of DSA
[29 Mar 2005] DSA-699-1 netkit-telnet-ssl - buffer overflow
{CAN-2005-0469}
- - netkit-telnet-ssl (unfixed; bug #302036)
+ - netkit-telnet-ssl 0.17.24+0.1-7.1
NOTE: not fixed in testing at time of DSA
[29 Mar 2005] DSA-698-1 mc - buffer overflow
{CAN-2005-0763}