Author: jmm-guest
Date: 2005-11-23 09:57:34 +0000 (Wed, 23 Nov 2005)
New Revision: 2840
Modified:
data/CVE/list
Log:
new potential kernel issues
bugnums
Modified: data/CVE/list
==================================================================---
data/CVE/list 2005-11-23 09:19:04 UTC (rev 2839)
+++ data/CVE/list 2005-11-23 09:57:34 UTC (rev 2840)
@@ -1,3 +1,6 @@
+CVE-2005-XXXX [Two potential netfilter DoS issues]
+ - linux-2.6 <unfixed>
+ NOTE: Pinged Horms/dannf
CVE-2005-3759 [XSS in horde3]
- horde3 3.0.7-1 (bug #340323; medium)
CVE-2004-2569 [Insecure temp file in ipmenu]
@@ -1692,7 +1695,7 @@
RESERVED
CVE-2005-3186 (Integer overflow in the GTK+ gdk-pixbuf XPM image rendering
library in ...)
- gtk+2.0 2.6.10-2 (bug #339431; medium)
- - gdk-pixbuf 0.22.0-11 (bug #339431; medium)
+ - gdk-pixbuf 0.22.0-11 (bug #339431; bug #339458; medium)
CVE-2005-3184 (Buffer overflow vulnerability in the unicode_to_bytes in the
Service ...)
- ethereal <unfixed> (bug #334880; medium)
CVE-2005-3183 (The HTBoundary_put_block function in HTBound.c for W3C libwww
...)
@@ -9655,7 +9658,7 @@
NOT-FOR-US: Sumus web server
CVE-2005-1109 (The filtering of URLs in JunkBuster before 2.0.2-r3 allows
remote ...)
{DSA-713-1}
- - junkbuster <removed>
+ - junkbuster <removed> (bug #304793)
NOTE: checked privoxy, is not vulnerable
CVE-2005-1108 (The ij_untrusted_url function in JunkBuster 2.0.2-r2, with ...)
{DSA-713-1}
@@ -20189,14 +20192,9 @@
CVE-2002-1476 (Buffer overflow in setlocale in libc on NetBSD 1.4.x through
1.6, and ...)
NOT-FOR-US: NetBSD
CVE-2002-1472 (libX11.so in xfree86, when used in setuid or setgid programs,
allows ...)
- - xfree86 4.2.1-1
- NOTE: Accordong to http://www.securityfocus.com/bid/5735/info/
- NOTE: woody is still vulnerable
- NOTE: open bug #280872
+ - xfree86 4.2.1-1 (bug #280872)
CVE-2002-1471 (The camel component for Ximian Evolution 1.0.x and earlier does
not ...)
- - evolution 1.2.0-1
- NOTE: woody seems to be still vulnerable
- NOTE: open bug #280883
+ - evolution 1.2.0-1 (bug #280883)
CVE-2002-1469 (scponly does not properly verify the path when finding the (1)
scp or ...)
- scponly 3.8-1
NOTE: according to http://sublimation.org/scponly/ (scponly home page)