[Secure-testing-commits] r4785 - data/CVE

Moritz Muehlenhoff jmm-guest at costa.debian.org
Sat Sep 30 14:12:38 UTC 2006


Author: jmm-guest
Date: 2006-09-30 14:12:37 +0000 (Sat, 30 Sep 2006)
New Revision: 4785

Modified:
   data/CVE/list
Log:
no-dsa for overkill
bind8 behaviour documented
move old kernel issue into kernel tracker
remove apt non-issue


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2006-09-30 14:08:54 UTC (rev 4784)
+++ data/CVE/list	2006-09-30 14:12:37 UTC (rev 4785)
@@ -4663,7 +4663,8 @@
 CVE-2006-2972 (SQL injection vulnerability in vs_resource.php in Arantius Vice Stats ...)
 	NOT-FOR-US: Arantius Vice Stats
 CVE-2006-2971 (Integer overflow in the recv_packet function in 0verkill 0.16 allows ...)
-	- overkill 0.16-9 (bug #373687; medium)
+	- overkill 0.16-9 (bug #373687; low)
+	[sarge] - overkill <no-dsa> (Only DoS against an obscure game, no code injection possible)
 CVE-2006-2970 (videoPage.php in L0j1k tinyMuw 0.1.0 allows remote attackers to obtain ...)
 	NOT-FOR-US: tinyMuw
 CVE-2006-2969 (Cross-site scripting (XSS) vulnerability in L0j1k tinyMuw 0.1.0 allow ...)
@@ -10556,10 +10557,11 @@
 	[sarge] - evolution <not-affected> (Vulnerability was apparantly introduced in 2.3.1)
 	[woody] - evolution <not-affected> (Vulnerability was apparantly introduced in 2.3.1)
 CVE-2006-0527 (BIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, ...)
-	- bind <unfixed> (medium)
+	- bind 1:8.4.7-1 (low)
 	[sarge] - bind <no-dsa> (Architectual limitatiom, upgrade to BIND 9 as a a fix)
 	NOTE: BIND 8 is unsuitable for forwarder use because of its
 	NOTE: architecture.  Upgrade to BIND 9 as a fix.
+	NOTE: This was fixed in sid by documenting it as an unfixable design limitation
 CVE-2006-0526 (The default configuration of the America Online (AOL) client software ...)
 	NOT-FOR-US: AOL
 CVE-2006-0525 (Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator ...)
@@ -16175,9 +16177,6 @@
 CVE-2005-XXXX [tar's rmt command may have undesired side effects]
 	- tar <unfixed> (bug #290435; unimportant)
 	[sarge] - tar <no-dsa> (Hardly exploitable)
-CVE-2005-XXXX [smbmount doesn't honor gid/uid with kernel 2.4]
-	- kernel-source-2.4.27 <unfixed> (bug #310982; low)
-	NOTE: probably already fixed in testing, wrote for confirmation
 CVE-2004-XXXX [Unspecified buffer overflow in libmng]
 	- libmng 1.0.8-1 (bug #250106)
 CVE-2004-XXXX [Multiple buffer overflows in isoqlog]
@@ -16186,12 +16185,6 @@
 	- libnss-ldap 199-1 (bug #169793)
 CVE-2005-3752 (Unspecified vulnerability in ldapdiff before 1.1.1 has unknown impact ...)
 	- ldapdiff <not-affected> (The version in Debian doesn't contain the vulnerable code, see #306878)
-CVE-2005-XXXX [apt-cache doesn't differentiate sources which share several properties]
-	- apt <unfixed> (bug #329814; low)
-	[sarge] - apt <no-dsa> (Unsupported use case)
-	NOTE: I tend to remove this completely, if you're using apt sources which include vulnerable
-	NOTE: versions of Debian packages with higher version numbers you're screwed anyway, no matter
-	NOTE: what apt display in this case
 CVE-2004-XXXX [asciijump: /var/games/asciijump world writable]
 	- asciijump 0.0.6-1.2 (bug #269186)
 CVE-2004-XXXX [Barrendero spool world-readable]




More information about the Secure-testing-commits mailing list