[Secure-testing-commits] r33348 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Fri Apr 3 04:43:39 UTC 2015


Author: carnil
Date: 2015-04-03 04:43:39 +0000 (Fri, 03 Apr 2015)
New Revision: 33348

Modified:
   data/CVE/list
Log:
Cleanup CVE request references for already assigned issues

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2015-04-03 04:17:35 UTC (rev 33347)
+++ data/CVE/list	2015-04-03 04:43:39 UTC (rev 33348)
@@ -161,7 +161,7 @@
 CVE-2015-2793 [cross-site scripting via openid_identifier]
 	RESERVED
 	- ikiwiki 3.20141016.2 (bug #781483)
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/30/5
+	NOTE: http://www.openwall.com/lists/oss-security/2015/03/30/5
 CVE-2015-2806 [two-byte stack overflow in asn1_der_decoding]
 	RESERVED
 	[experimental] - libtasn1-6 4.4-1
@@ -179,7 +179,7 @@
 CVE-2015-2782 [buffer overflow]
 	RESERVED
 	- arj 3.10.22-13 (bug #774015)
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/28/5
+	NOTE: http://www.openwall.com/lists/oss-security/2015/03/28/5
 CVE-2015-2756 (QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict ...)
 	- xen <unfixed> (bug #781620)
 	NOTE: http://xenbits.xen.org/xsa/advisory-126.html
@@ -1061,7 +1061,7 @@
 CVE-2015-2788 [Buffer Overflow in dbdimp.c]
 	RESERVED
 	- libdbd-firebird-perl 1.18-2 (bug #780925)
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/30/4
+	NOTE: http://www.openwall.com/lists/oss-security/2015/03/30/4
 CVE-2015-XXXX [SoapClient's __call() type confusion through unserialize()]
 	- php5 5.6.7+dfsg-1
 	NOTE: https://bugs.php.net/bug.php?id=69085
@@ -1401,7 +1401,7 @@
 	[wheezy] - python-restkit <no-dsa> (Minor issue)
 	[squeeze] - python-restkit <no-dsa> (Minor issue)
 	NOTE: https://github.com/benoitc/restkit/issues/140
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/12/9
+	NOTE: http://www.openwall.com/lists/oss-security/2015/03/12/9
 CVE-2015-2283
 	RESERVED
 CVE-2015-2282
@@ -1994,7 +1994,7 @@
 	NOTE: 2.15 ist the first version recieving the fix, mark with upstream version which should
 	NOTE: be handled correctly then by the tracker.
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=13138
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/26/2
+	NOTE: http://www.openwall.com/lists/oss-security/2015/02/26/2
 	NOTE: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=3f8cc204fdd0
 	NOTE: CVE assigned specific to the https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4 issue
 CVE-2015-2079




More information about the Secure-testing-commits mailing list