[Secure-testing-commits] r23180 - data/CVE

Thijs Kinkhorst thijs at alioth.debian.org
Sat Aug 3 09:13:01 UTC 2013


Author: thijs
Date: 2013-08-03 09:13:01 +0000 (Sat, 03 Aug 2013)
New Revision: 23180

Modified:
   data/CVE/list
Log:
jboss, ospf issues not-affected; several more nfu's


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2013-08-03 08:48:41 UTC (rev 23179)
+++ data/CVE/list	2013-08-03 09:13:01 UTC (rev 23180)
@@ -1786,34 +1786,48 @@
 	NOT-FOR-US: Ruby Rgpg Gem
 CVE-2013-4202
 	RESERVED
-CVE-2013-4201
+CVE-2013-4201 [Katello: CLI - user without access can call "system remove_deletion" command]
 	RESERVED
-CVE-2013-4200
+	NOT-FOR-US: Katello
+CVE-2013-4200 [plone: Forwarding of cookie data (session hijack) in certain browsers (in_portal.py)]
 	RESERVED
-CVE-2013-4199
+	NOT-FOR-US: Plone
+CVE-2013-4199 [plone: DoS by decompressing large zip archives (cb_decode.py, linkintegrity.py)]
 	RESERVED
-CVE-2013-4198
+	NOT-FOR-US: Plone
+CVE-2013-4198 [plone: Authenticated users able to alter their password despite of policy definition / setting prohibiting it (mail_password.py)]
 	RESERVED
-CVE-2013-4197
+	NOT-FOR-US: Plone
+CVE-2013-4197 [plone: Authenticated users able to modify / delete portraits of other users (member_portrait.py)]
 	RESERVED
-CVE-2013-4196
+	NOT-FOR-US: Plone
+CVE-2013-4196 [plone: Multiple information exposure flaws via certain object methods (objectmanager.py)]
 	RESERVED
-CVE-2013-4195
+	NOT-FOR-US: Plone
+CVE-2013-4195 [plone: Open redirect in the HTTP server implementation (marmoset_patch.py, publish.py, principiaredirect.py)]
 	RESERVED
-CVE-2013-4194
+	NOT-FOR-US: Plone
+CVE-2013-4194 [plone: File system path exposure (wysiwyg.py)]
 	RESERVED
-CVE-2013-4193
+	NOT-FOR-US: Plone
+CVE-2013-4193 [plone: Anonymous users capable to hide certain fields from content edit forms (typeswidget.py)]
 	RESERVED
-CVE-2013-4192
+	NOT-FOR-US: Plone
+CVE-2013-4192 [plone: Ability to spoof emails (sendto.py)]
 	RESERVED
-CVE-2013-4191
+	NOT-FOR-US: Plone
+CVE-2013-4191 [plone: Information exposure due improper access control enforcement when generating zip archives (zip.py)]
 	RESERVED
-CVE-2013-4190
+	NOT-FOR-US: Plone
+CVE-2013-4190 [plone: Multiple cross-site scripting (XSS) flaws (spamProtect.py, pts.py, request.py)]
 	RESERVED
-CVE-2013-4189
+	NOT-FOR-US: Plone
+CVE-2013-4189 [plone: Privilege escalation due improper authorization (dataitems.py, get.py, traverseName.py)]
 	RESERVED
-CVE-2013-4188
+	NOT-FOR-US: Plone
+CVE-2013-4188 [plone: DoS (infinite loop) by administrator privilege users when retrieving information for certain resources (traverser.py)]
 	RESERVED
+	NOT-FOR-US: Plone
 CVE-2013-4187 [Access Bypass]
 	RESERVED
 	NOT-FOR-US: Flippy Contributed Drupal module
@@ -12950,8 +12964,10 @@
 	- xen <not-affected> (Only applies to Xen 4.2, which is only available in experimental)
 CVE-2013-0150
 	RESERVED
-CVE-2013-0149
+CVE-2013-0149 [VU#229804 Open Shortest Path First (OSPF) Protocol does not specify unique LSA lookup identifers]
 	RESERVED
+	- quagga <not-affected>
+	NOTE: OSPF protocol vulnerability, quagga implementation not affected
 CVE-2013-0148 (The Data Camouflage (aka FairCom Standard Encryption) algorithm in ...)
 	NOT-FOR-US: FairCom c-treeACE
 CVE-2013-0147
@@ -46881,8 +46897,10 @@
 CVE-2010-3858 (The setup_arg_pages function in fs/exec.c in the Linux kernel before ...)
 	{DSA-2126-1}
 	- linux-2.6 2.6.32-27
-CVE-2010-3857
+CVE-2010-3857 [JBoss BRMS XSS via UUID parameter]
 	RESERVED
+	- jbossas4 <not-affected> (Vulnerable code not present)
+	NOTE: JBoss 5 only; fixed in 5.1.0
 CVE-2010-3856 (ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and ...)
 	{DSA-2122-2 DSA-2122-1}
 	- glibc <removed>




More information about the Secure-testing-commits mailing list