diff options
author | security tracker role <sectracker@soriano.debian.org> | 2020-01-24 20:10:35 +0000 |
---|---|---|
committer | security tracker role <sectracker@soriano.debian.org> | 2020-01-24 20:10:35 +0000 |
commit | a641973311a0109511fdcc4312e435d490322520 (patch) | |
tree | b67e285f9a6fb2573c6888862e6b7e4dd7e1f1cb /data/CVE/list.2011 | |
parent | 1e9dbe51c496a60a8ec3bba2328b02625138b94b (diff) |
automatic update
Diffstat (limited to 'data/CVE/list.2011')
-rw-r--r-- | data/CVE/list.2011 | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/data/CVE/list.2011 b/data/CVE/list.2011 index 2be38a8c41..a27227c6e9 100644 --- a/data/CVE/list.2011 +++ b/data/CVE/list.2011 @@ -5421,7 +5421,7 @@ CVE-2011-3174 (Buffer overflow in the DoFindReplace function in the ISGrid.Grid2 NOT-FOR-US: Novell ZENworks Configuration Management CVE-2011-3173 (Stack-based buffer overflow in the GetDriverSettings function in nippl ...) NOT-FOR-US: Novell Open Enterprise Server -CVE-2011-3172 (A vulnerability in pam_modules of SUSE SUSE Linux Enterprise allows at ...) +CVE-2011-3172 (A vulnerability in pam_modules of SUSE Linux Enterprise allows attacke ...) - libpam-unix2 <removed> NOTE: https://bugzilla.suse.com/show_bug.cgi?id=707645 NOTE: Issue was not fixed up to the version removed from unstable. @@ -12915,7 +12915,7 @@ CVE-2011-0469 (Code injection in openSUSE when running some source services used NOTE: Secondary fix: https://github.com/openSUSE/open-build-service/commit/23c8d21c75242999e29379e6ca8418a14c8725c6 CVE-2011-0468 (The aaa_base package before 11.3-8.9.1 in SUSE openSUSE 11.3, and befo ...) NOT-FOR-US: OpenSUSE aaa_base package -CVE-2011-0467 (A vulnerability in the listing of available software of SUSE SUSE Stud ...) +CVE-2011-0467 (A vulnerability in the listing of available software of SUSE Studio On ...) NOT-FOR-US: SUSE Studio Onsite CVE-2011-0466 (The API in SUSE openSUSE Build Service (OBS) 2.0.x before 2.0.8 and 2. ...) NOT-FOR-US: openSUSE Build Service |