[Secure-testing-commits] r33348 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Fri Apr 3 04:43:39 UTC 2015
Author: carnil
Date: 2015-04-03 04:43:39 +0000 (Fri, 03 Apr 2015)
New Revision: 33348
Modified:
data/CVE/list
Log:
Cleanup CVE request references for already assigned issues
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2015-04-03 04:17:35 UTC (rev 33347)
+++ data/CVE/list 2015-04-03 04:43:39 UTC (rev 33348)
@@ -161,7 +161,7 @@
CVE-2015-2793 [cross-site scripting via openid_identifier]
RESERVED
- ikiwiki 3.20141016.2 (bug #781483)
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/30/5
+ NOTE: http://www.openwall.com/lists/oss-security/2015/03/30/5
CVE-2015-2806 [two-byte stack overflow in asn1_der_decoding]
RESERVED
[experimental] - libtasn1-6 4.4-1
@@ -179,7 +179,7 @@
CVE-2015-2782 [buffer overflow]
RESERVED
- arj 3.10.22-13 (bug #774015)
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/28/5
+ NOTE: http://www.openwall.com/lists/oss-security/2015/03/28/5
CVE-2015-2756 (QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict ...)
- xen <unfixed> (bug #781620)
NOTE: http://xenbits.xen.org/xsa/advisory-126.html
@@ -1061,7 +1061,7 @@
CVE-2015-2788 [Buffer Overflow in dbdimp.c]
RESERVED
- libdbd-firebird-perl 1.18-2 (bug #780925)
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/30/4
+ NOTE: http://www.openwall.com/lists/oss-security/2015/03/30/4
CVE-2015-XXXX [SoapClient's __call() type confusion through unserialize()]
- php5 5.6.7+dfsg-1
NOTE: https://bugs.php.net/bug.php?id=69085
@@ -1401,7 +1401,7 @@
[wheezy] - python-restkit <no-dsa> (Minor issue)
[squeeze] - python-restkit <no-dsa> (Minor issue)
NOTE: https://github.com/benoitc/restkit/issues/140
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/12/9
+ NOTE: http://www.openwall.com/lists/oss-security/2015/03/12/9
CVE-2015-2283
RESERVED
CVE-2015-2282
@@ -1994,7 +1994,7 @@
NOTE: 2.15 ist the first version recieving the fix, mark with upstream version which should
NOTE: be handled correctly then by the tracker.
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=13138
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/26/2
+ NOTE: http://www.openwall.com/lists/oss-security/2015/02/26/2
NOTE: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=3f8cc204fdd0
NOTE: CVE assigned specific to the https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4 issue
CVE-2015-2079
More information about the Secure-testing-commits
mailing list