[Secure-testing-commits] r708 - in sarge-checks: CAN DSA

Joey Hess joeyh@costa.debian.org
Thu, 31 Mar 2005 21:13:52 +0000


Author: joeyh
Date: 2005-03-31 21:13:48 +0000 (Thu, 31 Mar 2005)
New Revision: 708

Modified:
   sarge-checks/CAN/list
   sarge-checks/DSA/list
Log:
netkit-telnet-ssl nmu


Modified: sarge-checks/CAN/list
===================================================================
--- sarge-checks/CAN/list	2005-03-31 19:18:34 UTC (rev 707)
+++ sarge-checks/CAN/list	2005-03-31 21:13:48 UTC (rev 708)
@@ -1734,7 +1734,6 @@
 	- wpasupplicant 0.3.8-1
 CAN-2005-0469 (Buffer overflow in the slc_add_reply function in various BSD-based ...)
 	{DSA-699-1 DSA-697-1}
-	{ DSA-697-1}
 	TODO: heimdal contains a BSD derived telnet client as well, check whether it's vulnerable
 	TODO: krb4 contains a BSD derived telnet client as well, check whether it's vulnerable
 	TODO: krb5 contains a BSD derived telnet client as well, check whether it's vulnerable

Modified: sarge-checks/DSA/list
===================================================================
--- sarge-checks/DSA/list	2005-03-31 19:18:34 UTC (rev 707)
+++ sarge-checks/DSA/list	2005-03-31 21:13:48 UTC (rev 708)
@@ -7,7 +7,7 @@
 	NOTE: not fixed in testing at time of DSA
 [29 Mar 2005] DSA-699-1 netkit-telnet-ssl - buffer overflow
 	{CAN-2005-0469}
-	- netkit-telnet-ssl (unfixed; bug #302036)
+	- netkit-telnet-ssl 0.17.24+0.1-7.1
 	NOTE: not fixed in testing at time of DSA
 [29 Mar 2005] DSA-698-1 mc - buffer overflow
 	{CAN-2005-0763}