[Secure-testing-commits] r3716 - data/CVE
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Thu Mar 30 13:31:34 UTC 2006
Author: jmm-guest
Date: 2006-03-30 13:31:25 +0000 (Thu, 30 Mar 2006)
New Revision: 3716
Modified:
data/CVE/list
Log:
more checks of Sarge versions
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2006-03-30 09:28:36 UTC (rev 3715)
+++ data/CVE/list 2006-03-30 13:31:25 UTC (rev 3716)
@@ -3463,6 +3463,7 @@
[sarge] - bogofilter <not-affected> (Only some 0.96 CVS versions were affected)
CVE-2005-4591 (Heap-based buffer overflow in bogofilter 0.96.2, 0.95.2, 0.94.14, ...)
- bogofilter 0.96.3
+ [sarge] - bogofilter <not-affected> (Sarge version doesn't include Unicode)
CVE-2005-4590 (Spb Kiosk Engine 1.0.0.1 allows local users to bypass restrictions on ...)
NOT-FOR-US: Spb Kiosk Engine
CVE-2005-4589 (Spb Kiosk Engine 1.0.0.1 stores the administrator's passcode in the ...)
@@ -7706,6 +7707,8 @@
NOTE: kmail was once part of kdenetwork.
CVE-2002-XXXX [sanitizer bypassal through quoted file names]
- sanitizer 1.76-1 (bug #149799; medium)
+ [sarge] - sanitizer <not-affected> (Sarge version already fixed)
+ NOTE: This was fixed earlier in fact, but it's unknown when
CVE-2005-XXXX [Heap overflow in libosip URI parsing]
- libosip2 2.0.9-1 (bug #308737)
CVE-2005-XXXX [rkhunter: Insecure temporary file]
@@ -11369,7 +11372,8 @@
- libphysfs 1.0.0-5 (bug #318091; medium)
- oops <unfixed> (bug #318097; medium)
[woody] - rpm <not-affected> (Woody contains zlib 1.1, which is not affected)
- - rpm 4.0.4-31.1 (bug #318099; medium)
+ - rpm 4.0.4-31.1 (bug #318099; unimportant)
+ NOTE: You need to trust rpms anyway, when installing them
- rageircd 2.0.0-3sid1 (bug #309196; medium)
- systemimager-ssh <unfixed> (bug #318101; unimportant)
[woody] - texmacs <not-affected> (Woody contains zlib 1.1, which is not affected)
@@ -14455,6 +14459,7 @@
- syslog-ng 1.6.5-2.1
CVE-2005-XXXX [trackballs: Follows symlinks as gid games]
- trackballs 1.1.1-1 (bug #302454; medium)
+ [sarge] - trackballs <no-dsa> (Hardly exploitable)
NOTE: CVE request sent to mitre (who sent this? any response?)
NOTE: Trackballs doesn't run as gid games anymore, high-score files are
NOTE: stored in user's home directories instead.
More information about the Secure-testing-commits
mailing list