diff options
author | Micah Anderson <micah@debian.org> | 2005-09-22 12:33:08 +0000 |
---|---|---|
committer | Micah Anderson <micah@debian.org> | 2005-09-22 12:33:08 +0000 |
commit | ef8295eb935cca9a27731d2042d2ffd9f2605e3a (patch) | |
tree | 9df14d6cd035652ac2c2411e27f9ba168f048c70 /data/DTSA/advs | |
parent | 36373fbd871561c532cc683617304e803795c6b8 (diff) |
Preparing python2.2 adv.
added xerves24 to removed-packages
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2089 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs')
-rw-r--r-- | data/DTSA/advs/19-python2.2.adv | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/data/DTSA/advs/19-python2.2.adv b/data/DTSA/advs/19-python2.2.adv new file mode 100644 index 0000000000..6bdb6f2558 --- /dev/null +++ b/data/DTSA/advs/19-python2.2.adv @@ -0,0 +1,17 @@ +source: python2.2 +date: September 22, 2005 +author: Micah Anderson +vuln-type: integer overflow +problem-scope: remote +debian-specifc: no +cve: CAN-2005-2491 +vendor-advisory: +testing-fix: 2.2.3dfsg-2sarge1 +sid-fix: 2.2.3dfsg-4 +upgrade: apt-get install python2.2 + +An integer overflow with a subsequent buffer overflow has been detected +in PCRE, the Perl Compatible Regular Expressions library, allowing +a remote attacker to execute arbitrary code. This code is also present in Python. +Exploiting this vulnerability requires an attacker to specify the used +regular expression. |