[Secure-testing-commits] r12540 - data/CVE

Moritz Muehlenhoff jmm-guest at alioth.debian.org
Sun Aug 9 19:45:15 UTC 2009


Author: jmm-guest
Date: 2009-08-09 19:45:15 +0000 (Sun, 09 Aug 2009)
New Revision: 12540

Modified:
   data/CVE/list
Log:
no-dsa for apache/crypt, Stefan please change if you disagree


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2009-08-09 19:17:06 UTC (rev 12539)
+++ data/CVE/list	2009-08-09 19:45:15 UTC (rev 12540)
@@ -35,6 +35,8 @@
 	TODO: request CVE id
 CVE-2009-XXXX [apache2: only first 8 characters used to validate password]
 	- apache2 <unfixed> (low; bug #539246)
+	[lenny] - apache2 <no-dsa> (Standard behaviour of crypt)
+	[etch] - apache2 <no-dsa> (Standard behaviour of crypt)
 CVE-2009-XXXX [gnudips: remote priviledge escalation]
 	- gnudips <unfixed> (medium; bug #539452)
 	TODO: request CVE id
@@ -938,7 +940,8 @@
 	- mysql-dfsg-5.0 <unfixed> (low; bug #536726) 
 	TODO: check lenny/sid; they are likely fixed according to the report, but i did not check
 CVE-2009-XXXX [libio-socket-ssl-perl: partial hostname matching vulnerability]
-	- libio-socket-ssl-perl 1.26-1 (medium; bug #535946)
+	- libio-socket-ssl-perl 1.26-1 (low; bug #535946)
+	[lenny] - libio-socket-ssl-perl <no-dsa> (Scheduled for next point update)
         TODO: next point release: [lenny] - libio-socket-ssl-perl 1.16-1+lenny1
 	NOTE: hostname validition is not implemented until 1.14, so etch 
 	NOTE: is in a way is not affected, but in another sense, it is 




More information about the Secure-testing-commits mailing list