From 6fe1462963e94ba69ff7c3ed4f30579fd824e2e2 Mon Sep 17 00:00:00 2001 From: Micah Anderson Date: Thu, 22 Sep 2005 12:50:20 +0000 Subject: de-prepare DTSA for python2.2 git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2093 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- data/DTSA/advs/18-kdelibs.adv | 15 +++++++ data/DTSA/advs/18-python2.2.adv | 17 -------- data/DTSA/advs/19-kdelibs.adv | 15 ------- data/DTSA/hints/micah | 1 - data/DTSA/list | 3 -- website/DTSA/DTSA-18-1.html | 91 ----------------------------------------- website/list.html | 2 - 7 files changed, 15 insertions(+), 129 deletions(-) create mode 100644 data/DTSA/advs/18-kdelibs.adv delete mode 100644 data/DTSA/advs/18-python2.2.adv delete mode 100644 data/DTSA/advs/19-kdelibs.adv delete mode 100644 website/DTSA/DTSA-18-1.html diff --git a/data/DTSA/advs/18-kdelibs.adv b/data/DTSA/advs/18-kdelibs.adv new file mode 100644 index 0000000000..4b12cbd030 --- /dev/null +++ b/data/DTSA/advs/18-kdelibs.adv @@ -0,0 +1,15 @@ +source: kdelibs +date: September 13th, 2005 +author: Moritz Muehlenhoff +vuln-type: insecure default permissions +problem-scope: local +debian-specifc: no +cve: CAN-2005-1920 +vendor-advisory: +testing-fix: 4:3.3.2-6.1etch1 +sid-fix: 4:3.4.2-1 +upgrade: apt-get install kdelibs4 + +kate always created backup files for edited files with default permissions, +even if the original permissions were stricter. This could lead to information +disclosure. \ No newline at end of file diff --git a/data/DTSA/advs/18-python2.2.adv b/data/DTSA/advs/18-python2.2.adv deleted file mode 100644 index 6bdb6f2558..0000000000 --- a/data/DTSA/advs/18-python2.2.adv +++ /dev/null @@ -1,17 +0,0 @@ -source: python2.2 -date: September 22, 2005 -author: Micah Anderson -vuln-type: integer overflow -problem-scope: remote -debian-specifc: no -cve: CAN-2005-2491 -vendor-advisory: -testing-fix: 2.2.3dfsg-2sarge1 -sid-fix: 2.2.3dfsg-4 -upgrade: apt-get install python2.2 - -An integer overflow with a subsequent buffer overflow has been detected -in PCRE, the Perl Compatible Regular Expressions library, allowing -a remote attacker to execute arbitrary code. This code is also present in Python. -Exploiting this vulnerability requires an attacker to specify the used -regular expression. diff --git a/data/DTSA/advs/19-kdelibs.adv b/data/DTSA/advs/19-kdelibs.adv deleted file mode 100644 index 4b12cbd030..0000000000 --- a/data/DTSA/advs/19-kdelibs.adv +++ /dev/null @@ -1,15 +0,0 @@ -source: kdelibs -date: September 13th, 2005 -author: Moritz Muehlenhoff -vuln-type: insecure default permissions -problem-scope: local -debian-specifc: no -cve: CAN-2005-1920 -vendor-advisory: -testing-fix: 4:3.3.2-6.1etch1 -sid-fix: 4:3.4.2-1 -upgrade: apt-get install kdelibs4 - -kate always created backup files for edited files with default permissions, -even if the original permissions were stricter. This could lead to information -disclosure. \ No newline at end of file diff --git a/data/DTSA/hints/micah b/data/DTSA/hints/micah index bf1c2a5db6..5b46942bf0 100644 --- a/data/DTSA/hints/micah +++ b/data/DTSA/hints/micah @@ -1,2 +1 @@ sync lm-sensors/1:2.9.1-6etch1 -sync python2.2/2.2.3dfsg-2sarge1 diff --git a/data/DTSA/list b/data/DTSA/list index a56e047f5a..8d06c3cf3d 100644 --- a/data/DTSA/list +++ b/data/DTSA/list @@ -48,6 +48,3 @@ [September 15th, 2005] DTSA-17-1 lm-sensors - insecure temporary file {CAN-2005-2672 } - lm-sensors 1:2.9.1-6etch1 -[September 22, 2005] DTSA-18-1 python2.2 - integer overflow - {CAN-2005-2491 } - - python2.2 2.2.3dfsg-2sarge1 diff --git a/website/DTSA/DTSA-18-1.html b/website/DTSA/DTSA-18-1.html deleted file mode 100644 index f4869d86a0..0000000000 --- a/website/DTSA/DTSA-18-1.html +++ /dev/null @@ -1,91 +0,0 @@ - - - Debian testing security team - Advisory - - - - -
- - - - - Debian Project -
-
- - - - - - - - - - - -
- Debian testing security team - Advisory -
- - -
- - -

DTSA-18-1

-
-
Date Reported:
-
September 22, 2005
-
Affected Package:
-
python2.2
-
Vulnerability:
-
integer overflow
-
Problem-Scope:
-
remote
-
Debian-specific:
-
No
-
CVE:
-
-CAN-2005-2491 -
-
More information:
-
An integer overflow with a subsequent buffer overflow has been detected 
-in PCRE, the Perl Compatible Regular Expressions library, allowing 
-a remote attacker to execute arbitrary code. This code is also present in Python. 
-Exploiting this vulnerability requires an attacker to specify the used 
-regular expression. 
-
-
For the testing distribution (etch) this is fixed in version 2.2.3dfsg-2sarge1
-
For the unstable distribution (sid) this is fixed in version 2.2.3dfsg-4
-
This upgrade is recommended if you use python2.2.
-
If you have the secure testing lines in your sources.list, you can update by running this command as root:
- -
apt-get update && apt-get install python2.2
-
- -
-
To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:
-
-
deb http://secure-testing-mirrors.debian.net/debian-secure-testing etch-proposed-updates/security-updates main contrib non-free
-
deb-src http://secure-testing-mirrors.debian.net/debian-secure-testing etch-proposed-updates/security-updates main contrib non-free
-
-
The archive signing key can be downloaded from
-
http://secure-testing.debian.net/ziyi-2005-7.asc
- -
- - -
- - Valid HTML 4.01! - - Valid CSS! - - - - diff --git a/website/list.html b/website/list.html index 1fe0818093..13e3b4c494 100644 --- a/website/list.html +++ b/website/list.html @@ -71,8 +71,6 @@
various
[September 15th, 2005] DTSA-17-1 lm-sensors
insecure temporary file
-
[September 22, 2005] DTSA-18-1 python2.2
-
integer overflow

-- cgit v1.2.3