[Git][security-tracker-team/security-tracker][master] Replace more spurious tab characters with spaces

Florian Weimer fw at debian.org
Tue Mar 17 13:24:22 GMT 2020



Florian Weimer pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9e739398 by Florian Weimer at 2020-03-17T14:22:18+01:00
Replace more spurious tab characters with spaces

- - - - -


1 changed file:

- data/DSA/list


Changes:

=====================================
data/DSA/list
=====================================
@@ -14342,14 +14342,14 @@
 	[woody] - sox 12.17.3-4woody2 (bug #262083)
 [13 Oct 2004] DSA-564-1 mpg123 - missing user input sanitising
 	{CVE-2004-0805}
-	[woody]	- mpg123 0.59r-13woody3
+	[woody] - mpg123 0.59r-13woody3
 [12 Oct 2004] DSA-563-3 cyrus-sasl - unsanitised input
 	{CVE-2004-0884}
 	[woody] - cyrus-sasl 1.5.27-3.1woody5 (bug #275432)
 	NOTE: 563-1 and 563-2 had problems on sparc/arm and with sendmail
 [11 Oct 2004] DSA-562-2 mysql - several vulnerabilities
 	{CVE-2004-0835 CVE-2004-0836 CVE-2004-0837}
-	[woody]	- mysql 3.23.49-8.8
+	[woody] - mysql 3.23.49-8.8
 [11 Oct 2004] DSA-561-1 xfree86 - integer and stack overflows
 	{CVE-2004-0687 CVE-2004-0688}
 	[woody] - xfree86 4.1.0-16woody4
@@ -14569,7 +14569,7 @@
 	[woody] - kernel-image-2.4.16-riscpc 20040419
 [21 Apr 2004] DSA-494 ident2 - buffer overflow
 	{CVE-2004-0408}
-	[woody]	- ident2 1.03-3woody1
+	[woody] - ident2 1.03-3woody1
 [21 Apr 2004] DSA-493 xchat - buffer overflow
 	{CVE-2004-0409}
 	[woody] - xchat 1.8.9-0woody3
@@ -14582,7 +14582,7 @@
 	[woody] - kernel-patch-2.4.19-mips 2.4.19-0.020911.1.woody4
 [17 Apr 2004] DSA-490 zope - arbitrary code execution
 	{CVE-2002-0688}
-	[woody]	- zope 2.5.1-1woody1
+	[woody] - zope 2.5.1-1woody1
 [17 Apr 2004] DSA-489 linux-kernel-2.4.17-mips+mipsel - several vulnerabilities
 	{CVE-2004-0003 CVE-2004-0010 CVE-2004-0109 CVE-2004-0177 CVE-2004-0178}
  	[woody] - kernel-source-2.4.17 2.4.17-1woody3
@@ -14590,19 +14590,19 @@
 	[woody] - kernel-patch-2.4.17-mipsel 2.4.17-0.020226.2.woody6
 [16 Apr 2004] DSA-488 logcheck - insecure temporary directory
 	{CVE-2004-0404}
-	[woody]	- logcheck 1.1.1-13.1woody1
+	[woody] - logcheck 1.1.1-13.1woody1
 [16 Apr 2004] DSA-487 neon - format string
 	{CVE-2004-0179}
 	[woody] - neon 0.19.3-2woody3
 [16 Apr 2004] DSA-486 cvs - several vulnerabilities
 	{CVE-2004-0180 CVE-2004-0405}
-	[woody]	- cvs 1.11.1p1debian-9woody2
+	[woody] - cvs 1.11.1p1debian-9woody2
 [14 Apr 2004] DSA-485 ssmtp - format string
 	{CVE-2004-0156}
-	[woody]	- ssmtp 2.50.6.1
+	[woody] - ssmtp 2.50.6.1
 [14 Apr 2004] DSA-484 xonix - failure to drop privileges
 	{CVE-2004-0157}
-	[woody]	- xonix 1.4-19woody1
+	[woody] - xonix 1.4-19woody1
 [14 Apr 2004] DSA-483 mysql - insecure temporary file creation
 	{CVE-2004-0381 CVE-2004-0388}
 	[woody] - mysql 3.23.49-8.6
@@ -14631,10 +14631,10 @@
 	[woody] - tcpdump 3.6.2-2.8
 [06 Apr 2004] DSA-477 xine-ui - insecure temporary file creation
 	{CVE-2004-0372}
-	[woody]	- xine-ui 0.9.8-5
+	[woody] - xine-ui 0.9.8-5
 [06 Apr 2004] DSA-476 heimdal - cross-realm
 	{CVE-2004-0371}
-	[woody]	- heimdal 0.4e-7.woody.8.1
+	[woody] - heimdal 0.4e-7.woody.8.1
 [05 Apr 2004] DSA-475 linux-kernel-2.4.18-hppa - several vulnerabilities
 	{CVE-2003-0961 CVE-2003-0985 CVE-2004-0077}
 	[woody] - kernel-image-2.4.18-hppa 62.1
@@ -14643,7 +14643,7 @@
 	[woody] - squid 2.4.6-2woody2
 [03 Apr 2004] DSA-473 oftpd - denial of service
 	{CVE-2004-0376}
-	[woody]	- oftpd 0.3.6-6
+	[woody] - oftpd 0.3.6-6
 [03 Apr 2004] DSA-472 fte - several vulnerabilities
 	{CVE-2003-0648}
 	[woody] - fte 0.49.13-15woody1
@@ -14779,10 +14779,10 @@
 	[woody] - cgiemail 1.6-14woody1
 [08 Feb 2004] DSA-436 mailman - several vulnerabilities
 	{CVE-2003-0991 CVE-2003-0965 CVE-2003-0038}
-	[woody]	- mailman 2.0.11-1woody7
+	[woody] - mailman 2.0.11-1woody7
 [06 Feb 2004] DSA-435 mpg123 - heap overflow
 	{CVE-2003-0865}
-	[woody]	- mpg123 0.59r-13woody2
+	[woody] - mpg123 0.59r-13woody2
 [05 Feb 2004] DSA-434 gaim - several vulnerabilities
 	{CVE-2004-0005 CVE-2004-0006 CVE-2004-0007 CVE-2004-0008}
 	[woody] - gaim 0.58-2.4
@@ -14815,15 +14815,15 @@
 	[woody] - tcpdump 3.6.2-2.7
 [16 Jan 2004] DSA-424 mc - buffer overflow
 	{CVE-2003-1023}
-	[woody]	- mc 4.5.55-1.2woody2
+	[woody] - mc 4.5.55-1.2woody2
 [15 Jan 2004] DSA-423 linux-kernel-2.4.17-ia64 - several vulnerabilities
 	{CVE-2003-0001 CVE-2003-0018 CVE-2003-0127 CVE-2003-0461 CVE-2003-0462 CVE-2003-0476 CVE-2003-0501 CVE-2003-0550 CVE-2003-0551 CVE-2003-0552 CVE-2003-0961 CVE-2003-0985}
 	[woody] - kernel-image-2.4.17-ia64 kernel-image-2.4.17-ia64
 [13 Jan 2004] DSA-422 cvs - remote vulnerability
-	[woody]	- cvs 1.11.11
+	[woody] - cvs 1.11.11
 [12 Jan 2004] DSA-421 mod-auth-shadow - password expiration
 	{CVE-2004-0041}
-	[woody]	- mod-auth-shadow 1.3-3.1woody.1
+	[woody] - mod-auth-shadow 1.3-3.1woody.1
 [12 Jan 2004] DSA-420 jitterbug - improperly sanitised input
 	{CVE-2004-0028}
 	[woody] - jitterbug 1.6.2-4.2woody2
@@ -14839,7 +14839,7 @@
 	[woody] - kernel-image-2.4.18-1-alpha 2.4.18-12
 [06 Jan 2004] DSA-416 fsp - buffer overflow, directory traversal
 	{CVE-2003-1022 CVE-2004-0011}
-	[woody]	- fsp 2.81.b3-3.1woody1
+	[woody] - fsp 2.81.b3-3.1woody1
 [06 Jan 2004] DSA-415 zebra - denial of service
 	{CVE-2003-0795 CVE-2003-0858}
 	NOTE: [woody] - zebra 0.92a-5woody2
@@ -14853,16 +14853,16 @@
 	[woody] - kernel-image-2.4.18-1-i386 2.4.18-12.1
 [05 Jan 2004] DSA-412 nd - buffer overflows
 	{CVE-2004-0014}
-	[woody]	- nd 0.5.0-1woody1
+	[woody] - nd 0.5.0-1woody1
 [05 Jan 2004] DSA-411 mpg321 - format string vulnerability
 	{CVE-2003-0969}
-	[woody]	- mpg321 0.2.10.2
+	[woody] - mpg321 0.2.10.2
 [05 Jan 2004] DSA-410 libnids - buffer overflow
 	{CVE-2003-0850}
 	[woody] - libnids 1.16-3woody1
 [05 Jan 2004] DSA-409 bind - denial of service
 	{CVE-2003-0914}
-	[woody]	- bind 1:8.3.3-2.0woody2
+	[woody] - bind 1:8.3.3-2.0woody2
 [05 Jan 2004] DSA-408 screen - integer overflow
 	{CVE-2003-0972}
 	[woody] - screen 3.9.11-5woody1
@@ -14874,7 +14874,7 @@
 	[woody] - lftp 2.4.9-1woody2
 [30 Dec 2003] DSA-405 xsok - missing privilege release
 	{CVE-2003-0949}
-	[woody]	- xsok 1.02-9woody2
+	[woody] - xsok 1.02-9woody2
 [04 Dec 2003] DSA-404 rsync - heap overflow
 	{CVE-2003-0962}
 	[woody] - rsync 2.5.5-0.2
@@ -14891,10 +14891,10 @@
 	[woody] - hylafax 4.1.1-1.3
 [11 Nov 2003] DSA-400 omega-rpg - buffer overflow
 	{CVE-2003-0932}
-	[woody]	- omega-rpg 0.90-pa9-7woody1
+	[woody] - omega-rpg 0.90-pa9-7woody1
 [10 Nov 2003] DSA-399 epic4 - buffer overflow
 	{CVE-2003-0328}
-	[woody]	- epic4 1.1.2.20020219-2.2
+	[woody] - epic4 1.1.2.20020219-2.2
 [10 Nov 2003] DSA-398 conquest - buffer overflow
 	{CVE-2003-0933}
 	[woody] - conquest 7.1.1-6woody1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9e739398682dc396fa8566d5d84ec25df544ae0c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9e739398682dc396fa8566d5d84ec25df544ae0c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200317/c4a47525/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list