Author: micah Date: 2005-03-22 08:45:20 +0100 (Tue, 22 Mar 2005) New Revision: 608 Modified: sarge-checks/CAN/list Log: Bug and notes for 2005-0210, 0209 and some others Modified: sarge-checks/CAN/list ==================================================================--- sarge-checks/CAN/list 2005-03-22 07:30:00 UTC (rev 607) +++ sarge-checks/CAN/list 2005-03-22 07:45:20 UTC (rev 608) @@ -2290,9 +2290,12 @@ {DSA-667-1} CAN-2005-0210 (Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a ...) NOTE: fixed in ubuntu kernels - TODO: check with kernel team + NOTE: 2.6.11 is not affected, apparantly 2.6.10 is no longer relevant + - kernel-source-2.6.8 (unfixed; bug#300838) + - kernel-source-2.4.27 2.4.27-9 CAN-2005-0209 (Netfilter in Linux kernel 2.6.8.1 allows remote attackers to cause a ...) - TODO: check + NOTE: <horms> all kernels seem to be clear with regards to 2005-0209 + NOTE: <dilinger> http://oss.sgi.com/archives/netdev/2005-01/msg01072.html resolves this and it is in all our kernels CAN-2005-0208 (The HTML parsing functions in Gaim before 1.1.4 allow remote attackers ...) - gaim 1:1.1.4 CAN-2005-0207 (Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows ...) @@ -2300,10 +2303,11 @@ NOTE: http://linux.bkbits.net:8080/linux-2.6/cset@41db2d65wbgJvuXTv4x9_quExW0vEA NOTE: fixed in upstream 2.6.10, 2.6.9 is dead - kernel-source-2.6.8 2.6.8-14 - - kernel-source-2.6.8 2.6.8-14 CAN-2005-0206 (The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 ...) - tetex-bin (unfixed; bug #300182) TODO: check other packages + NOTE: Also needs to be checked in pdftex (in tetex-bin) gpdf, kpdf/kdegraphics, cupsysnd and pdftohtml all have xpdf code + NOTE: found this: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=135393 CAN-2005-0205 (KPPP 2.1.2 in KDE 3.1.5 and earlier, when setuid root without certain ...) {DSA-692-1} - kppp 4:3.1.6 @@ -6748,7 +6752,7 @@ NOTE: affects multiple S/MIME implementations NOTE: checked current mozilla, which contains safe NSS 3.9.1 - mozilla 2:1.7.3 - TODO: see if anything else in debian uses S/MIME and is vulnerable. + TODO: see if anything else in debian uses S/MIME and is vulnerable, mutt has S/MIME unknown if its vulnerable CAN-2003-0563 NOTE: reserved CAN-2003-0562 (Buffer overflow in the CGI2PERL.NLM PERL handler in Novell Netware 5.1 ...)