summaryrefslogtreecommitdiffstats
path: root/data/DTSA/advs
diff options
context:
space:
mode:
authorMicah Anderson <micah@debian.org>2005-09-22 12:50:20 +0000
committerMicah Anderson <micah@debian.org>2005-09-22 12:50:20 +0000
commit6fe1462963e94ba69ff7c3ed4f30579fd824e2e2 (patch)
tree8ab190856da75e6d325b5f9386351829ad5993ac /data/DTSA/advs
parent849d4002fb6ace0b501516477fdbabbd829bea93 (diff)
de-prepare DTSA for python2.2
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2093 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs')
-rw-r--r--data/DTSA/advs/18-kdelibs.adv (renamed from data/DTSA/advs/19-kdelibs.adv)0
-rw-r--r--data/DTSA/advs/18-python2.2.adv17
2 files changed, 0 insertions, 17 deletions
diff --git a/data/DTSA/advs/19-kdelibs.adv b/data/DTSA/advs/18-kdelibs.adv
index 4b12cbd030..4b12cbd030 100644
--- a/data/DTSA/advs/19-kdelibs.adv
+++ b/data/DTSA/advs/18-kdelibs.adv
diff --git a/data/DTSA/advs/18-python2.2.adv b/data/DTSA/advs/18-python2.2.adv
deleted file mode 100644
index 6bdb6f2558..0000000000
--- a/data/DTSA/advs/18-python2.2.adv
+++ /dev/null
@@ -1,17 +0,0 @@
-source: python2.2
-date: September 22, 2005
-author: Micah Anderson
-vuln-type: integer overflow
-problem-scope: remote
-debian-specifc: no
-cve: CAN-2005-2491
-vendor-advisory:
-testing-fix: 2.2.3dfsg-2sarge1
-sid-fix: 2.2.3dfsg-4
-upgrade: apt-get install python2.2
-
-An integer overflow with a subsequent buffer overflow has been detected
-in PCRE, the Perl Compatible Regular Expressions library, allowing
-a remote attacker to execute arbitrary code. This code is also present in Python.
-Exploiting this vulnerability requires an attacker to specify the used
-regular expression.

© 2014-2024 Faster IT GmbH | imprint | privacy policy