[Secure-testing-commits] r27601 - data/CVE
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Fri Jul 4 06:05:57 UTC 2014
Author: jmm
Date: 2014-07-04 06:05:56 +0000 (Fri, 04 Jul 2014)
New Revision: 27601
Modified:
data/CVE/list
Log:
openstack n/a
pnp4nagios no-dsa
fixup rails/wheezy entries
openvz n/a
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2014-07-04 04:55:41 UTC (rev 27600)
+++ data/CVE/list 2014-07-04 06:05:56 UTC (rev 27601)
@@ -1,12 +1,15 @@
CVE-2014-XXXX [XSS via views/template.php]
- - pnp4nagios <unfixed>
+ - pnp4nagios <unfixed> (low)
NOTE: https://github.com/lingej/pnp4nagios/commit/cb925073edeeb97eb4ce61a86cdafccc9b87f9bb
+ NOTE: https://bugs.gentoo.org/show_bug.cgi?id=516078
CVE-2014-XXXX [XSS via views/kohana_error_page.php]
- - pnp4nagios <unfixed>
+ - pnp4nagios <unfixed> (low)
+ [wheezy] - pnp4nagios <no-dsa> (Minor issue)
NOTE: https://github.com/lingej/pnp4nagios/commit/e4a19768a5c5e5b1276caf3dd5bb721a540ec014
NOTE: https://bugs.gentoo.org/show_bug.cgi?id=516140
CVE-2014-XXXX [XSS - input is not properly sanitised in views/kohana_error_page.php]
- - pnp4nagios <unfixed>
+ - pnp4nagios <unfixed> (low)
+ [wheezy] - pnp4nagios <no-dsa> (Minor issue)
NOTE: https://bugs.gentoo.org/show_bug.cgi?id=51607
NOTE: http://sourceforge.net/p/pnp4nagios/code/ci/f846a6c9d007ca2bee05359af747619151195fc9/
CVE-2014-4715 [LZ4_decompress_generic() integer overflow (32-bit arches)]
@@ -2590,8 +2593,11 @@
CVE-2014-3520 [Keystone V2 trusts privilege escalation through user supplied project id]
RESERVED
- keystone 2014.1.1-3 (bug #753511)
+ [wheezy] - keystone <not-affected> (Vulnerable code not present)
CVE-2014-3519
RESERVED
+ - linux-2.6 <not-affected> (Vulnerable code not yet present)
+ - linux <not-affected> (Kernels after squeeze no longer contain the openvz flavour)
CVE-2014-3518
RESERVED
CVE-2014-3517
@@ -2696,6 +2702,7 @@
- ruby-activerecord-2.3 <removed>
- ruby-activerecord-3.2 <removed>
- rails <unfixed>
+ [wheezy] - rails <not-affected> (src:rails in wheezy is just a transition package)
- rails-3.2 <unfixed>
- rails-4.0 <unfixed>
TODO: check, additionally rails is now again a sourcepackage e.g. providing ruby-activerecord-3.2
@@ -2704,6 +2711,7 @@
- ruby-activerecord-2.3 <removed>
- ruby-activerecord-3.2 <removed>
- rails <unfixed>
+ [wheezy] - rails <not-affected> (src:rails in wheezy is just a transition package)
- rails-3.2 <unfixed>
- rails-4.0 <unfixed>
TODO: check, additionally rails is now again a sourcepackage e.g. providing ruby-activerecord-3.2
@@ -28291,7 +28299,9 @@
NOT-FOR-US: Ubuntu MAAS
CVE-2013-1068 (The OpenStack Nova (python-nova) package 1:2013.2.3-0 before ...)
- nova 2014.1.1-4 (bug #753579)
+ [wheezy] - nova <not-affected> (Vulnerable code not present)
- cinder 2014.1.1-3 (bug #753585)
+ [wheezy] - cinder <not-affected> (Vulnerable code not present)
NOTE: Requires includedir to be defined in /etc/sudoers file
CVE-2013-1067 (Apport 2.12.5 and earlier uses weak permissions for core dump files ...)
- apport 2.12.6-1 (bug #727661)
More information about the Secure-testing-commits
mailing list