summaryrefslogtreecommitdiffstats
path: root/data/DTSA/advs
diff options
context:
space:
mode:
authorMicah Anderson <micah@debian.org>2005-09-22 12:33:08 +0000
committerMicah Anderson <micah@debian.org>2005-09-22 12:33:08 +0000
commitef8295eb935cca9a27731d2042d2ffd9f2605e3a (patch)
tree9df14d6cd035652ac2c2411e27f9ba168f048c70 /data/DTSA/advs
parent36373fbd871561c532cc683617304e803795c6b8 (diff)
Preparing python2.2 adv.
added xerves24 to removed-packages git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2089 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs')
-rw-r--r--data/DTSA/advs/19-python2.2.adv17
1 files changed, 17 insertions, 0 deletions
diff --git a/data/DTSA/advs/19-python2.2.adv b/data/DTSA/advs/19-python2.2.adv
new file mode 100644
index 0000000000..6bdb6f2558
--- /dev/null
+++ b/data/DTSA/advs/19-python2.2.adv
@@ -0,0 +1,17 @@
+source: python2.2
+date: September 22, 2005
+author: Micah Anderson
+vuln-type: integer overflow
+problem-scope: remote
+debian-specifc: no
+cve: CAN-2005-2491
+vendor-advisory:
+testing-fix: 2.2.3dfsg-2sarge1
+sid-fix: 2.2.3dfsg-4
+upgrade: apt-get install python2.2
+
+An integer overflow with a subsequent buffer overflow has been detected
+in PCRE, the Perl Compatible Regular Expressions library, allowing
+a remote attacker to execute arbitrary code. This code is also present in Python.
+Exploiting this vulnerability requires an attacker to specify the used
+regular expression.

© 2014-2024 Faster IT GmbH | imprint | privacy policy