[Git][security-tracker-team/security-tracker][master] Replace spurious tab characters with spaces
Florian Weimer
fw at debian.org
Tue Mar 17 13:19:02 GMT 2020
Florian Weimer pushed to branch master at Debian Security Tracker / security-tracker
Commits:
85f4751c by Florian Weimer at 2020-03-17T14:15:11+01:00
Replace spurious tab characters with spaces
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -378503,15 +378503,15 @@ CVE-2007-0900 (Multiple PHP remote file inclusion vulnerabilities in TagIt! Tagb
CVE-2007-0899 (There is a possible heap overflow in libclamav/fsg.c before 0.100.0. ...)
{DSA-1263-1}
- clamav 0.90-1
- [etch] - clamav 0.88.7-2
+ [etch] - clamav 0.88.7-2
CVE-2007-0898 (Directory traversal vulnerability in clamd in Clam AntiVirus ClamAV be ...)
{DSA-1263-1}
- clamav 0.90-1 (bug #411117)
- [etch] - clamav 0.88.7-2
+ [etch] - clamav 0.88.7-2
CVE-2007-0897 (Clam AntiVirus ClamAV before 0.90 does not close open file descriptors ...)
{DSA-1263-1}
- clamav 0.90-1 (bug #411118)
- [etch] - clamav 0.88.7-2
+ [etch] - clamav 0.88.7-2
CVE-2007-0896 (Cross-site scripting (XSS) vulnerability in the (1) Sage before 1.3.10 ...)
- firefox-sage 1.3.10-1
[etch] - firefox-sage <not-affected> (HTML mode not enabled in Etch)
@@ -413854,7 +413854,7 @@ CVE-2004-1002 (Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote a
- ppp 2.4.2+20040428-3
CVE-2004-1001 (Unknown vulnerability in the passwd_check function in Shadow 4.0.4.1, ...)
{DSA-585-1}
- NOTE: Fixed in shadow 1:4.0.3-30.3 for the first time.
+ NOTE: Fixed in shadow 1:4.0.3-30.3 for the first time.
NOTE: Apparently, the fix was lost somehow, see #309587.
NOTE: It was reapplied to sarge before the release, and to sid in
NOTE: version 1:4.0.3-35.
@@ -414431,7 +414431,7 @@ CVE-2004-0788 (Integer overflow in the ICO image decoder for (1) gdk-pixbuf befo
CVE-2004-0787 (Cross-site scripting (XSS) vulnerability in the web frontend in OpenCA ...)
NOT-FOR-US: OpenCA
CVE-2004-0786 (The IPv6 URI parsing routines in the apr-util library for Apache 2.0.5 ...)
- - apache <not-affected> (not vulnerable according to http://web.archive.org/web/20070529152436/http://www.debian.org/security/nonvulns-sarge)
+ - apache <not-affected> (not vulnerable according to http://web.archive.org/web/20070529152436/http://www.debian.org/security/nonvulns-sarge)
- apache2 2.0.51
CVE-2004-0785 (Multiple buffer overflows in Gaim before 0.82 allow remote attackers t ...)
- gaim 1:0.82
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/85f4751c4d44c6a60b68b1eab7304c7204228b70
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/85f4751c4d44c6a60b68b1eab7304c7204228b70
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200317/f3795595/attachment.html>
More information about the debian-security-tracker-commits
mailing list