[Secure-testing-commits] r8317 - in data: . CVE
jmm-guest at alioth.debian.org
jmm-guest at alioth.debian.org
Tue Mar 11 23:03:55 UTC 2008
Author: jmm-guest
Date: 2008-03-11 23:03:54 +0000 (Tue, 11 Mar 2008)
New Revision: 8317
Modified:
data/CVE/list
data/spu-candidates.txt
Log:
more no-dsa
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2008-03-11 22:42:05 UTC (rev 8316)
+++ data/CVE/list 2008-03-11 23:03:54 UTC (rev 8317)
@@ -1053,10 +1053,10 @@
NOTE: source package named sword, binary package named diatheke
CVE-2008-0806 (wyrd 1.4.3b allows local users to overwrite arbitrary files via a ...)
- wyrd 1.4.3b-4 (low; bug #466382)
+ [etch] - wyrd <no-dsa> (Minor issue)
CVE-2008-0807 (lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before ...)
{DSA-1507-1}
- turba2 2.1.7-1 (bug #464058)
- NOTE: CVE id pending
CVE-2008-0779 (The fortimon.sys device driver in Fortinet FortiClient Host Security ...)
NOT-FOR-US: Fortinet FortiClient 3.0
CVE-2008-0778 (Multiple stack-based buffer overflows in an ActiveX control in ...)
@@ -1289,10 +1289,13 @@
- pcre3 7.6-1 (medium)
CVE-2008-0673 (TinTin++ 1.97.9 and WinTin++ 1.97.9 open files on the basis of an ...)
- tintin++ 1.97.9-2 (low; bug #465643)
+ [etch] - tintin++ <no-dsa> (Minor issue)
CVE-2008-0672 (The process_chat_input function in TinTin++ 1.97.9 and WinTin++ 1.97.9 ...)
- tintin++ 1.97.9-2 (low; bug #465643)
+ [etch] - tintin++ <no-dsa> (Minor issue)
CVE-2008-0671 (Stack-based buffer overflow in the add_line_buffer function in ...)
- tintin++ 1.97.9-2 (medium; bug #465643)
+ [etch] - tintin++ <no-dsa> (Minor issue)
CVE-2008-0670 (SQL injection vulnerability in index.php in the Noticias ...)
NOT-FOR-US: Noticias component for Joomla!
CVE-2008-0669 (Cross-site scripting (XSS) vulnerability in search.cgi in Sift Unity ...)
@@ -2469,6 +2472,7 @@
- kfreebsd-7 <unfixed>
- kfreebsd-6 <unfixed>
- kfreebsd-5 <removed>
+ [etch] - kfreebsd-5 <no-dsa> (FreeBSD not supported)
NOTE: Linux kernel code is not affected, the proper check is there
NOTE: (somewhat difficult to spot, it happens in the caller).
CVE-2008-0176 (Heap-based buffer overflow in w32rtr.exe in GE Fanuc CIMPLICITY HMI ...)
Modified: data/spu-candidates.txt
===================================================================
--- data/spu-candidates.txt 2008-03-11 22:42:05 UTC (rev 8316)
+++ data/spu-candidates.txt 2008-03-11 23:03:54 UTC (rev 8317)
@@ -143,6 +143,11 @@
--
+wyrd (CVE-2008-0806)
+bug #466382
+
+--
+
xfce4 (CVE-2007-6351 CVE-2007-6352)
notified maintainer
More information about the Secure-testing-commits
mailing list