[Secure-testing-commits] r22610 - in data: . CVE

Thijs Kinkhorst thijs at alioth.debian.org
Sat Jun 15 13:20:18 UTC 2013


Author: thijs
Date: 2013-06-15 13:20:17 +0000 (Sat, 15 Jun 2013)
New Revision: 22610

Modified:
   data/CVE/list
   data/next-point-update.txt
Log:
wheezy 7.1


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2013-06-15 12:49:35 UTC (rev 22609)
+++ data/CVE/list	2013-06-15 13:20:17 UTC (rev 22610)
@@ -3716,6 +3716,8 @@
 CVE-2013-2850 (Heap-based buffer overflow in the iscsi_add_notunderstood_response ...)
 	- linux 3.9.4-1
 	- linux-2.6 <removed>
+	[wheezy] - linux 3.2.46-1
+	[jessie] - linux 3.2.46-1
 CVE-2013-2849 (Multiple cross-site scripting (XSS) vulnerabilities in Google Chrome ...)
 	{DSA-2695-1}
 	- chromium-browser 27.0.1453.93-1
@@ -3904,7 +3906,8 @@
 	RESERVED
 	- modsecurity-apache 2.6.6-9 (bug #710217)
 	- libapache-mod-security <removed> (bug #710217)
-	[wheezy] - modsecurity-apache <no-dsa> (Minor issue)
+	[wheezy] - modsecurity-apache 2.6.6-6+deb7u1
+	[jessie] - modsecurity-apache 2.6.6-6+deb7u1
 	[squeeze] - libapache-mod-security <no-dsa> (Minor issue)
 	NOTE: https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES
 	NOTE: https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba
@@ -5416,6 +5419,8 @@
 CVE-2013-2146 (arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before ...)
 	- linux-2.6 <removed>
 	- linux 3.9.4-1
+	[wheezy] - linux 3.2.46-1
+	[jessie] - linux 3.2.46-1
 CVE-2013-2145 [arbitrary code execution when verifying SIGNATURE]
 	RESERVED
 	- libmodule-signature-perl 0.73-1 (bug #711239)
@@ -5749,14 +5754,15 @@
 	RESERVED
 	- openvpn 2.3.1-1 (low; bug #707329)
 	[squeeze] - openvpn <no-dsa> (Minor issue)
-	[wheezy] - openvpn <no-dsa> (Minor issue)
+	[wheezy] - openvpn 2.2.1-8+deb7u1
 	NOTE: https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc
 CVE-2013-2060
 	RESERVED
 	NOT-FOR-US: OpenShift
 CVE-2013-2059 (OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly ...)
 	- keystone 2013.1.1-2 (bug #707598)
-	[wheezy] - keystone <no-dsa> (Minor issue)
+	[wheezy] - keystone 2012.1.1-13+wheezy1
+	[jessie] - keystone 2012.1.1-13+wheezy1
 	NOTE: http://lists.openstack.org/pipermail/openstack-announce/2013-May/000099.html
 CVE-2013-2058 [linux: chipidea: allow disabling streaming in host mode]
 	RESERVED
@@ -5823,7 +5829,7 @@
 CVE-2013-2038 [DoS (packet parser crash) in the AIS driver when processing malformed packet]
 	RESERVED
 	- gpsd 3.6-5 (bug #706665)
-	[wheezy] - gpsd <no-dsa> (Minor issue)
+	[wheezy] - gpsd 3.6-4+deb7u1
 	NOTE: http://lists.nongnu.org/archive/html/gpsd-dev/2013-05/msg00000.html
 CVE-2013-2037 [httplib2: SSL cert incorrect error handling]
 	RESERVED
@@ -6266,7 +6272,7 @@
 	RESERVED
 	- nfs-utils 1:1.2.8-1 (low; bug #707401)
 	[squeeze] - nfs-utils <no-dsa> (Minor issue)
-	[wheezy] - nfs-utils <no-dsa> (Minor issue)
+	[wheezy] - nfs-utils 1:1.2.6-4
 CVE-2013-1922 (qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw ...)
 	- xen <not-affected> (qemu-nbd-xen built, but not installed into the binary packages)
 	- qemu 1.5.0+dfsg-1 (low; bug #705544)

Modified: data/next-point-update.txt
===================================================================
--- data/next-point-update.txt	2013-06-15 12:49:35 UTC (rev 22609)
+++ data/next-point-update.txt	2013-06-15 13:20:17 UTC (rev 22610)
@@ -1,10 +0,0 @@
-CVE-2013-2038 [DoS (packet parser crash) in the AIS driver when processing malformed packet]
-	[wheezy] - gpsd 3.6-4+deb7u1
-CVE-2013-1923 [rpc.gssd is vulnerable to DNS spoofing]
-	[wheezy] - nfs-utils 1:1.2.6-4
-CVE-2013-2059 (OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly ...)
-	[wheezy] - keystone 2012.1.1-13+wheezy1
-CVE-2013-2061
-	[wheezy] - openvpn 2.2.1-8+deb7u1
-CVE-2013-2765
-	[wheezy] - modsecurity-apache 2.6.6-6+deb7u1




More information about the Secure-testing-commits mailing list