[Secure-testing-commits] r8317 - in data: . CVE

jmm-guest at alioth.debian.org jmm-guest at alioth.debian.org
Tue Mar 11 23:03:55 UTC 2008


Author: jmm-guest
Date: 2008-03-11 23:03:54 +0000 (Tue, 11 Mar 2008)
New Revision: 8317

Modified:
   data/CVE/list
   data/spu-candidates.txt
Log:
more no-dsa


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2008-03-11 22:42:05 UTC (rev 8316)
+++ data/CVE/list	2008-03-11 23:03:54 UTC (rev 8317)
@@ -1053,10 +1053,10 @@
 	NOTE: source package named sword, binary package named diatheke
 CVE-2008-0806 (wyrd 1.4.3b allows local users to overwrite arbitrary files via a ...)
 	- wyrd 1.4.3b-4 (low; bug #466382)
+	[etch] - wyrd <no-dsa> (Minor issue)
 CVE-2008-0807 (lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before ...)
 	{DSA-1507-1}
 	- turba2 2.1.7-1 (bug #464058)
-	NOTE: CVE id pending
 CVE-2008-0779 (The fortimon.sys device driver in Fortinet FortiClient Host Security ...)
 	NOT-FOR-US: Fortinet FortiClient 3.0
 CVE-2008-0778 (Multiple stack-based buffer overflows in an ActiveX control in ...)
@@ -1289,10 +1289,13 @@
 	- pcre3 7.6-1 (medium)
 CVE-2008-0673 (TinTin++ 1.97.9 and WinTin++ 1.97.9 open files on the basis of an ...)
 	- tintin++ 1.97.9-2 (low; bug #465643)
+	[etch] - tintin++ <no-dsa> (Minor issue)
 CVE-2008-0672 (The process_chat_input function in TinTin++ 1.97.9 and WinTin++ 1.97.9 ...)
 	- tintin++ 1.97.9-2 (low; bug #465643)
+	[etch] - tintin++ <no-dsa> (Minor issue)
 CVE-2008-0671 (Stack-based buffer overflow in the add_line_buffer function in ...)
 	- tintin++ 1.97.9-2 (medium; bug #465643)
+	[etch] - tintin++ <no-dsa> (Minor issue)
 CVE-2008-0670 (SQL injection vulnerability in index.php in the Noticias ...)
 	NOT-FOR-US: Noticias component for Joomla!
 CVE-2008-0669 (Cross-site scripting (XSS) vulnerability in search.cgi in Sift Unity ...)
@@ -2469,6 +2472,7 @@
 	- kfreebsd-7 <unfixed>
 	- kfreebsd-6 <unfixed>
 	- kfreebsd-5 <removed>
+	[etch] - kfreebsd-5 <no-dsa> (FreeBSD not supported)
 	NOTE: Linux kernel code is not affected, the proper check is there
 	NOTE: (somewhat difficult to spot, it happens in the caller).
 CVE-2008-0176 (Heap-based buffer overflow in w32rtr.exe in GE Fanuc CIMPLICITY HMI ...)

Modified: data/spu-candidates.txt
===================================================================
--- data/spu-candidates.txt	2008-03-11 22:42:05 UTC (rev 8316)
+++ data/spu-candidates.txt	2008-03-11 23:03:54 UTC (rev 8317)
@@ -143,6 +143,11 @@
 
 --
 
+wyrd (CVE-2008-0806)
+bug #466382
+
+--
+
 xfce4 (CVE-2007-6351 CVE-2007-6352)
 notified maintainer
 




More information about the Secure-testing-commits mailing list