Author: jmm
Date: 2013-01-02 16:05:07 +0000 (Wed, 02 Jan 2013)
New Revision: 20790

Modified:
   data/CVE/list
Log:
record moin wheezy fixes 
moodle insecure curl usage


Modified: data/CVE/list
===================================================================
--- data/CVE/list       2013-01-02 09:14:21 UTC (rev 20789)
+++ data/CVE/list       2013-01-02 16:05:07 UTC (rev 20790)
@@ -1,3 +1,6 @@
+CVE-2012-XXXX [moodle amazon-s3-php-class insecure curl usage]
+       - moodle <unfixed>
+       [wheezy] - moodle 2.2.3.dfsg-2.6~wheezy1
 CVE-2012-6453 [mediawiki-extensions rssreader injection]
        {DSA-2596-1}
        - mediawiki-extensions 2.11 (bug #696179)
@@ -1944,17 +1947,20 @@
        RESERVED
        {DSA-2593-1}
        - moin 1.9.5-2
+       [wheezy] - moin 1.9.4-8+deb7u1
        NOTE: Fix http://hg.moinmo.in/moin/1.9/rev/c98ec456e493
        NOTE: CVE request 
http://www.openwall.com/lists/oss-security/2012/12/29/7
 CVE-2012-6081 [moin: remote code execution vulnerability]
        RESERVED
        {DSA-2593-1}
+       [wheezy] - moin 1.9.4-8+deb7u1
        - moin 1.9.5-3 (bug #696948)
        NOTE: Fix http://hg.moinmo.in/moin/1.9/rev/7e7e1cbb9d3f
        NOTE: CVE request 
http://www.openwall.com/lists/oss-security/2012/12/29/6
 CVE-2012-6080 [moin: path traversal vulnerability]
        RESERVED
        {DSA-2593-1}
+       [wheezy] - moin 1.9.4-8+deb7u1
        - moin 1.9.5-4 (bug #696949)
        NOTE: Fix http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52
        NOTE: CVE request 
http://www.openwall.com/lists/oss-security/2012/12/29/8
@@ -3474,6 +3480,8 @@
 CVE-2012-5583 [phpcas curl usage]
        RESERVED
        - php-cas 1.3.1-2
+       - moodle <unfixed>
+       [wheezy] - moodle 2.2.3.dfsg-2.6~wheezy1
        NOTE: https://github.com/Jasig/phpCAS/pull/58
 CVE-2012-5582 [opendnssec curl usage]
        RESERVED


_______________________________________________
Secure-testing-commits mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to