From 8d88fc16fa48819dbe14593c3fb2cff1eaf09f4a Mon Sep 17 00:00:00 2001 From: Micah Anderson Date: Thu, 22 Sep 2005 12:50:20 +0000 Subject: de-prepare DTSA for python2.2 git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2093 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- website/DTSA/DTSA-18-1.html | 91 --------------------------------------------- website/list.html | 2 - 2 files changed, 93 deletions(-) delete mode 100644 website/DTSA/DTSA-18-1.html (limited to 'website') diff --git a/website/DTSA/DTSA-18-1.html b/website/DTSA/DTSA-18-1.html deleted file mode 100644 index f4869d86a0..0000000000 --- a/website/DTSA/DTSA-18-1.html +++ /dev/null @@ -1,91 +0,0 @@ - - - Debian testing security team - Advisory - - - - -
- - - - - Debian Project -
-
- - - - - - - - - - - -
- Debian testing security team - Advisory -
- - -
- - -

DTSA-18-1

-
-
Date Reported:
-
September 22, 2005
-
Affected Package:
-
python2.2
-
Vulnerability:
-
integer overflow
-
Problem-Scope:
-
remote
-
Debian-specific:
-
No
-
CVE:
-
-CAN-2005-2491 -
-
More information:
-
An integer overflow with a subsequent buffer overflow has been detected 
-in PCRE, the Perl Compatible Regular Expressions library, allowing 
-a remote attacker to execute arbitrary code. This code is also present in Python. 
-Exploiting this vulnerability requires an attacker to specify the used 
-regular expression. 
-
-
For the testing distribution (etch) this is fixed in version 2.2.3dfsg-2sarge1
-
For the unstable distribution (sid) this is fixed in version 2.2.3dfsg-4
-
This upgrade is recommended if you use python2.2.
-
If you have the secure testing lines in your sources.list, you can update by running this command as root:
- -
apt-get update && apt-get install python2.2
-
- -
-
To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:
-
-
deb http://secure-testing-mirrors.debian.net/debian-secure-testing etch-proposed-updates/security-updates main contrib non-free
-
deb-src http://secure-testing-mirrors.debian.net/debian-secure-testing etch-proposed-updates/security-updates main contrib non-free
-
-
The archive signing key can be downloaded from
-
http://secure-testing.debian.net/ziyi-2005-7.asc
- -
- - -
- - Valid HTML 4.01! - - Valid CSS! - - - - diff --git a/website/list.html b/website/list.html index 1fe0818093..13e3b4c494 100644 --- a/website/list.html +++ b/website/list.html @@ -71,8 +71,6 @@
various
[September 15th, 2005] DTSA-17-1 lm-sensors
insecure temporary file
-
[September 22, 2005] DTSA-18-1 python2.2
-
integer overflow

-- cgit v1.2.3