Author: thijs
Date: 2013-06-15 13:20:17 +0000 (Sat, 15 Jun 2013)
New Revision: 22610

Modified:
   data/CVE/list
   data/next-point-update.txt
Log:
wheezy 7.1


Modified: data/CVE/list
===================================================================
--- data/CVE/list       2013-06-15 12:49:35 UTC (rev 22609)
+++ data/CVE/list       2013-06-15 13:20:17 UTC (rev 22610)
@@ -3716,6 +3716,8 @@
 CVE-2013-2850 (Heap-based buffer overflow in the 
iscsi_add_notunderstood_response ...)
        - linux 3.9.4-1
        - linux-2.6 <removed>
+       [wheezy] - linux 3.2.46-1
+       [jessie] - linux 3.2.46-1
 CVE-2013-2849 (Multiple cross-site scripting (XSS) vulnerabilities in Google 
Chrome ...)
        {DSA-2695-1}
        - chromium-browser 27.0.1453.93-1
@@ -3904,7 +3906,8 @@
        RESERVED
        - modsecurity-apache 2.6.6-9 (bug #710217)
        - libapache-mod-security <removed> (bug #710217)
-       [wheezy] - modsecurity-apache <no-dsa> (Minor issue)
+       [wheezy] - modsecurity-apache 2.6.6-6+deb7u1
+       [jessie] - modsecurity-apache 2.6.6-6+deb7u1
        [squeeze] - libapache-mod-security <no-dsa> (Minor issue)
        NOTE: https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES
        NOTE: 
https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba
@@ -5416,6 +5419,8 @@
 CVE-2013-2146 (arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel 
before ...)
        - linux-2.6 <removed>
        - linux 3.9.4-1
+       [wheezy] - linux 3.2.46-1
+       [jessie] - linux 3.2.46-1
 CVE-2013-2145 [arbitrary code execution when verifying SIGNATURE]
        RESERVED
        - libmodule-signature-perl 0.73-1 (bug #711239)
@@ -5749,14 +5754,15 @@
        RESERVED
        - openvpn 2.3.1-1 (low; bug #707329)
        [squeeze] - openvpn <no-dsa> (Minor issue)
-       [wheezy] - openvpn <no-dsa> (Minor issue)
+       [wheezy] - openvpn 2.2.1-8+deb7u1
        NOTE: 
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc
 CVE-2013-2060
        RESERVED
        NOT-FOR-US: OpenShift
 CVE-2013-2059 (OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, 
Grizzly ...)
        - keystone 2013.1.1-2 (bug #707598)
-       [wheezy] - keystone <no-dsa> (Minor issue)
+       [wheezy] - keystone 2012.1.1-13+wheezy1
+       [jessie] - keystone 2012.1.1-13+wheezy1
        NOTE: 
http://lists.openstack.org/pipermail/openstack-announce/2013-May/000099.html
 CVE-2013-2058 [linux: chipidea: allow disabling streaming in host mode]
        RESERVED
@@ -5823,7 +5829,7 @@
 CVE-2013-2038 [DoS (packet parser crash) in the AIS driver when processing 
malformed packet]
        RESERVED
        - gpsd 3.6-5 (bug #706665)
-       [wheezy] - gpsd <no-dsa> (Minor issue)
+       [wheezy] - gpsd 3.6-4+deb7u1
        NOTE: 
http://lists.nongnu.org/archive/html/gpsd-dev/2013-05/msg00000.html
 CVE-2013-2037 [httplib2: SSL cert incorrect error handling]
        RESERVED
@@ -6266,7 +6272,7 @@
        RESERVED
        - nfs-utils 1:1.2.8-1 (low; bug #707401)
        [squeeze] - nfs-utils <no-dsa> (Minor issue)
-       [wheezy] - nfs-utils <no-dsa> (Minor issue)
+       [wheezy] - nfs-utils 1:1.2.6-4
 CVE-2013-1922 (qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format 
of a raw ...)
        - xen <not-affected> (qemu-nbd-xen built, but not installed into the 
binary packages)
        - qemu 1.5.0+dfsg-1 (low; bug #705544)

Modified: data/next-point-update.txt
===================================================================
--- data/next-point-update.txt  2013-06-15 12:49:35 UTC (rev 22609)
+++ data/next-point-update.txt  2013-06-15 13:20:17 UTC (rev 22610)
@@ -1,10 +0,0 @@
-CVE-2013-2038 [DoS (packet parser crash) in the AIS driver when processing 
malformed packet]
-       [wheezy] - gpsd 3.6-4+deb7u1
-CVE-2013-1923 [rpc.gssd is vulnerable to DNS spoofing]
-       [wheezy] - nfs-utils 1:1.2.6-4
-CVE-2013-2059 (OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, 
Grizzly ...)
-       [wheezy] - keystone 2012.1.1-13+wheezy1
-CVE-2013-2061
-       [wheezy] - openvpn 2.2.1-8+deb7u1
-CVE-2013-2765
-       [wheezy] - modsecurity-apache 2.6.6-6+deb7u1


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to