Annotation of wikisrc/users/spz/secref.mdwn, revision 1.2

1.1       wiki        1: [[!meta title Security Vulnerability Reference List]]
                      2: # Security Vulnerability Reference List
                      3: 
                      4: <table>
                      5: <tr><th>Identifier</th><th>Topic</th><th>Fixed in HEAD</th><th>Fixed in netbsd-5</th><th>Fixed in netbsd-4</th><th>Advisory</th></tr>
                      6: <tr><td>[[CVE-2010-3613|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613]]</td><td>BIND DoS due to improper handling of RRSIG records</td><td>20101202</td><td>20110110</td><td>20110123</td><td>[[2011-001|http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2011-001.txt.asc]]</td></tr>
                      7: <tr><td>[[CVE-2011-0014|http://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2011-0014]]</td><td>OpenSSL TLS extension parsing race condition</td><td>20110211</td><td>20110217</td><td>not affected</td><td>[[2011-002|http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2011-002.txt.asc]]</td></tr>
                      8: <tr><td>-</td><td>Exhausting kernel memory from user controlled value</td><td>20110304</td><td>20110307</td><td>20110307</td><td>[[2011-003|http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2011-003.txt.asc]]</td></tr>
                      9: <tr><td>[[CVE-2011-1547|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1547]]</td><td>Kernel stack overflow via nested IPCOMP packet</td><td>20110401</td><td>20110403</td><td>20110403</td><td>[[2011-004|http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2011-004.txt.asc]]</td></tr>
                     10: <tr><td>[[CVE-2011-0997|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997]]</td><td>ISC dhclient environment sanitizing</td><td>20110406</td><td>20110407</td><td>20110407</td><td>[[2011-005|http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2011-005.txt.asc]]</td></tr>
                     11: <tr><td>[[CVE-2011-2464|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464]]</td><td>BIND DoS via packet with rrtype zero</td><td>20110706</td><td>20110708</td><td>20110716</td><td>[[2011-006|http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2011-006.txt.asc]]</td></tr>
                     12: <tr><td>[[CVE-2011-2895|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895]]</td><td>LZW decoding loop on manipulated compressed files</td><td>20110816</td><td>20110819</td><td>20110819</td><td>[[2011-007|http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2011-007.txt.asc]]</td></tr>
                     13: <tr><td>[[CVE-2011-4122|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4122]]</td><td>OpenPAM privilege escalation</td><td>20111109</td><td>20111119</td><td>20111119</td><td>[[2011-008|http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2011-008.txt.asc]]</td></tr>
                     14: <tr><td>[[CVE-2011-4313|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313]]</td><td>BIND resolver DoS</td><td>20111116</td><td>20111118</td><td>20111120</td><td>[[2011-009|http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2011-009.txt.asc]]</td></tr>
                     15: <tr><td>[[CVE-2011-4862|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862]]</td><td>telnetd unchecked encryption key length</td><td>20111223</td><td>20111231</td><td>20111231</td><td></td></tr>
1.2     ! wiki       16: <tr><td>[[CVE-2010-1166|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1166]]</td><td>incorrect macro definition in Xrender</td><td>20111230</td><td>20120101</td><td>not affected</td><td></td></tr>
1.1       wiki       17: <tr><td></td><td></td><td></td><td></td><td></td><td></td></tr>
                     18: </table>

CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb